Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13/02/2021, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
B9B1.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
B9B1.exe
Resource
win10v20201028
General
-
Target
B9B1.exe
-
Size
684KB
-
MD5
7efdbcd2dda98974f89290ce0a02cdc7
-
SHA1
cbae61ac09fe75b570bee392aa70310ef4d94362
-
SHA256
eb8de87523800e3aa747857a06938f3af3856fbd42be025688e2ff50248ac197
-
SHA512
b9d334d10bc4c02007efcdd789a4fb91bffa3790c8d8357f438cd167c86097acc0b6d4889c1b81de77c42e8b7d5f04f3a8dffca80adc2a9148051b68d1215adc
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 3892 mpcmdrun.exe -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Executes dropped EXE 5 IoCs
pid Process 3144 updatewin1.exe 1028 updatewin2.exe 2668 updatewin.exe 3760 5.exe 3108 updatewin1.exe -
Loads dropped DLL 2 IoCs
pid Process 3760 5.exe 3760 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3776 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\bb89d61e-a283-4b86-9fbc-60fdfb180646\\B9B1.exe\" --AutoStart" B9B1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.2ip.ua 10 api.2ip.ua 11 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1776 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1204 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e B9B1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 B9B1.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 412 B9B1.exe 412 B9B1.exe 3568 B9B1.exe 3568 B9B1.exe 3760 5.exe 3760 5.exe 3760 5.exe 3760 5.exe 3760 5.exe 3760 5.exe 3760 5.exe 3760 5.exe 900 powershell.exe 900 powershell.exe 900 powershell.exe 900 powershell.exe 3880 powershell.exe 3880 powershell.exe 3880 powershell.exe 1312 powershell.exe 1312 powershell.exe 1312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1204 taskkill.exe Token: SeDebugPrivilege 900 powershell.exe Token: SeDebugPrivilege 3880 powershell.exe Token: SeDebugPrivilege 1312 powershell.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 412 wrote to memory of 3776 412 B9B1.exe 75 PID 412 wrote to memory of 3776 412 B9B1.exe 75 PID 412 wrote to memory of 3776 412 B9B1.exe 75 PID 412 wrote to memory of 3568 412 B9B1.exe 76 PID 412 wrote to memory of 3568 412 B9B1.exe 76 PID 412 wrote to memory of 3568 412 B9B1.exe 76 PID 3568 wrote to memory of 3144 3568 B9B1.exe 79 PID 3568 wrote to memory of 3144 3568 B9B1.exe 79 PID 3568 wrote to memory of 3144 3568 B9B1.exe 79 PID 3568 wrote to memory of 1028 3568 B9B1.exe 81 PID 3568 wrote to memory of 1028 3568 B9B1.exe 81 PID 3568 wrote to memory of 1028 3568 B9B1.exe 81 PID 3568 wrote to memory of 2668 3568 B9B1.exe 82 PID 3568 wrote to memory of 2668 3568 B9B1.exe 82 PID 3568 wrote to memory of 2668 3568 B9B1.exe 82 PID 3568 wrote to memory of 3760 3568 B9B1.exe 83 PID 3568 wrote to memory of 3760 3568 B9B1.exe 83 PID 3568 wrote to memory of 3760 3568 B9B1.exe 83 PID 2668 wrote to memory of 3532 2668 updatewin.exe 84 PID 2668 wrote to memory of 3532 2668 updatewin.exe 84 PID 2668 wrote to memory of 3532 2668 updatewin.exe 84 PID 3532 wrote to memory of 1776 3532 cmd.exe 86 PID 3532 wrote to memory of 1776 3532 cmd.exe 86 PID 3532 wrote to memory of 1776 3532 cmd.exe 86 PID 3144 wrote to memory of 3108 3144 updatewin1.exe 88 PID 3144 wrote to memory of 3108 3144 updatewin1.exe 88 PID 3144 wrote to memory of 3108 3144 updatewin1.exe 88 PID 3760 wrote to memory of 1832 3760 5.exe 90 PID 3760 wrote to memory of 1832 3760 5.exe 90 PID 3760 wrote to memory of 1832 3760 5.exe 90 PID 1832 wrote to memory of 1204 1832 cmd.exe 92 PID 1832 wrote to memory of 1204 1832 cmd.exe 92 PID 1832 wrote to memory of 1204 1832 cmd.exe 92 PID 3108 wrote to memory of 900 3108 updatewin1.exe 95 PID 3108 wrote to memory of 900 3108 updatewin1.exe 95 PID 3108 wrote to memory of 900 3108 updatewin1.exe 95 PID 3108 wrote to memory of 3880 3108 updatewin1.exe 97 PID 3108 wrote to memory of 3880 3108 updatewin1.exe 97 PID 3108 wrote to memory of 3880 3108 updatewin1.exe 97 PID 3880 wrote to memory of 1312 3880 powershell.exe 100 PID 3880 wrote to memory of 1312 3880 powershell.exe 100 PID 3880 wrote to memory of 1312 3880 powershell.exe 100 PID 3108 wrote to memory of 3892 3108 updatewin1.exe 102 PID 3108 wrote to memory of 3892 3108 updatewin1.exe 102 PID 3108 wrote to memory of 3296 3108 updatewin1.exe 104 PID 3108 wrote to memory of 3296 3108 updatewin1.exe 104 PID 3108 wrote to memory of 3296 3108 updatewin1.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\B9B1.exe"C:\Users\Admin\AppData\Local\Temp\B9B1.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\bb89d61e-a283-4b86-9fbc-60fdfb180646" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\B9B1.exe"C:\Users\Admin\AppData\Local\Temp\B9B1.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin1.exe"C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin1.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin1.exe"C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin1.exe" --Admin4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all5⤵
- Deletes Windows Defender Definitions
PID:3892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""5⤵PID:3296
-
-
-
-
C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin2.exe"C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:1028
-
-
C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin.exe"C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:1776
-
-
-
-
C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\5.exe"C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\0abd520e-d7ad-460a-939d-43ef859fc083\5.exe & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
-