Analysis
-
max time kernel
89s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-02-2021 13:52
Static task
static1
Behavioral task
behavioral1
Sample
95C8.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
95C8.exe
Resource
win10v20201028
General
-
Target
95C8.exe
-
Size
684KB
-
MD5
7efdbcd2dda98974f89290ce0a02cdc7
-
SHA1
cbae61ac09fe75b570bee392aa70310ef4d94362
-
SHA256
eb8de87523800e3aa747857a06938f3af3856fbd42be025688e2ff50248ac197
-
SHA512
b9d334d10bc4c02007efcdd789a4fb91bffa3790c8d8357f438cd167c86097acc0b6d4889c1b81de77c42e8b7d5f04f3a8dffca80adc2a9148051b68d1215adc
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 3596 mpcmdrun.exe -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Executes dropped EXE 5 IoCs
pid Process 992 updatewin1.exe 1412 updatewin2.exe 1588 updatewin.exe 2068 5.exe 4392 updatewin1.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 5.exe 2068 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3144 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a01920a9-34cd-4ad6-b245-962d72f22d75\\95C8.exe\" --AutoStart" 95C8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.2ip.ua 10 api.2ip.ua 17 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4388 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4520 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 95C8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 95C8.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4692 95C8.exe 4692 95C8.exe 3804 95C8.exe 3804 95C8.exe 2068 5.exe 2068 5.exe 2068 5.exe 2068 5.exe 2068 5.exe 2068 5.exe 2068 5.exe 2068 5.exe 4464 powershell.exe 4464 powershell.exe 4464 powershell.exe 4464 powershell.exe 4572 powershell.exe 4572 powershell.exe 4572 powershell.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 4572 powershell.exe Token: SeDebugPrivilege 3332 powershell.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3144 4692 95C8.exe 75 PID 4692 wrote to memory of 3144 4692 95C8.exe 75 PID 4692 wrote to memory of 3144 4692 95C8.exe 75 PID 4692 wrote to memory of 3804 4692 95C8.exe 76 PID 4692 wrote to memory of 3804 4692 95C8.exe 76 PID 4692 wrote to memory of 3804 4692 95C8.exe 76 PID 3804 wrote to memory of 992 3804 95C8.exe 78 PID 3804 wrote to memory of 992 3804 95C8.exe 78 PID 3804 wrote to memory of 992 3804 95C8.exe 78 PID 3804 wrote to memory of 1412 3804 95C8.exe 81 PID 3804 wrote to memory of 1412 3804 95C8.exe 81 PID 3804 wrote to memory of 1412 3804 95C8.exe 81 PID 3804 wrote to memory of 1588 3804 95C8.exe 82 PID 3804 wrote to memory of 1588 3804 95C8.exe 82 PID 3804 wrote to memory of 1588 3804 95C8.exe 82 PID 3804 wrote to memory of 2068 3804 95C8.exe 83 PID 3804 wrote to memory of 2068 3804 95C8.exe 83 PID 3804 wrote to memory of 2068 3804 95C8.exe 83 PID 1588 wrote to memory of 3556 1588 updatewin.exe 85 PID 1588 wrote to memory of 3556 1588 updatewin.exe 85 PID 1588 wrote to memory of 3556 1588 updatewin.exe 85 PID 3556 wrote to memory of 4388 3556 cmd.exe 87 PID 3556 wrote to memory of 4388 3556 cmd.exe 87 PID 3556 wrote to memory of 4388 3556 cmd.exe 87 PID 992 wrote to memory of 4392 992 updatewin1.exe 88 PID 992 wrote to memory of 4392 992 updatewin1.exe 88 PID 992 wrote to memory of 4392 992 updatewin1.exe 88 PID 4392 wrote to memory of 4464 4392 updatewin1.exe 89 PID 4392 wrote to memory of 4464 4392 updatewin1.exe 89 PID 4392 wrote to memory of 4464 4392 updatewin1.exe 89 PID 2068 wrote to memory of 4532 2068 5.exe 91 PID 2068 wrote to memory of 4532 2068 5.exe 91 PID 2068 wrote to memory of 4532 2068 5.exe 91 PID 4532 wrote to memory of 4520 4532 cmd.exe 93 PID 4532 wrote to memory of 4520 4532 cmd.exe 93 PID 4532 wrote to memory of 4520 4532 cmd.exe 93 PID 4392 wrote to memory of 4572 4392 updatewin1.exe 94 PID 4392 wrote to memory of 4572 4392 updatewin1.exe 94 PID 4392 wrote to memory of 4572 4392 updatewin1.exe 94 PID 4572 wrote to memory of 3332 4572 powershell.exe 96 PID 4572 wrote to memory of 3332 4572 powershell.exe 96 PID 4572 wrote to memory of 3332 4572 powershell.exe 96 PID 4392 wrote to memory of 3596 4392 updatewin1.exe 98 PID 4392 wrote to memory of 3596 4392 updatewin1.exe 98 PID 4392 wrote to memory of 3400 4392 updatewin1.exe 100 PID 4392 wrote to memory of 3400 4392 updatewin1.exe 100 PID 4392 wrote to memory of 3400 4392 updatewin1.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\95C8.exe"C:\Users\Admin\AppData\Local\Temp\95C8.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a01920a9-34cd-4ad6-b245-962d72f22d75" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\95C8.exe"C:\Users\Admin\AppData\Local\Temp\95C8.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin1.exe"C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin1.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin1.exe"C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin1.exe" --Admin4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all5⤵
- Deletes Windows Defender Definitions
PID:3596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""5⤵PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin2.exe"C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:1412
-
-
C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin.exe"C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\5.exe"C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\a932a68d-e54e-451f-b666-c6f74e236478\5.exe & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
-