Resubmissions

04-06-2021 01:54

210604-q1mqz6zlf2 10

03-06-2021 12:45

210603-5fgyg6535j 10

Analysis

  • max time kernel
    600s
  • max time network
    595s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    04-06-2021 01:54

General

  • Target

    570fbe91fdd6d1eb8cfd2f03c032cdde.exe

  • Size

    872KB

  • MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

  • SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

  • SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

  • SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

Malware Config

Extracted

Path

C:\_readme.txt

Family

djvu

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-B0FsLNO3fN Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: helpteam@mail.ch Reserve e-mail address to contact us: helpmanager@airmail.cc Your personal ID: 0300ewgfDdLQbDo3EfIVHxGuJOWRJdmxgY66rD6kiyqz4tzyt1
Emails

helpteam@mail.ch

helpmanager@airmail.cc

URLs

https://we.tl/t-B0FsLNO3fN

Signatures

  • Detected Djvu ransomeware 8 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Executes dropped EXE 4 IoCs
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    "C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
      "C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:640
      • C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
        "C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
          "C:\Users\Admin\AppData\Local\Temp\570fbe91fdd6d1eb8cfd2f03c032cdde.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Modifies extensions of user files
          • Suspicious behavior: EnumeratesProcesses
          PID:384
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {AC7C60FD-1233-464E-B5F1-ABEA6076343B} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
      C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe --Task
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
        C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe --Task
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:972
    • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
      C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe --Task
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
        C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe --Task
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1424

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SystemID\PersonalID.txt
    MD5

    c9141abc06f106bb6d58deb107253ac0

    SHA1

    8c748834dc38500d3632e3b6428977b02a6c8b84

    SHA256

    3d7cc5c63e5ac14b56e12c37ffa484eb9c4c3c28f89f36579d1d02da2433b0a2

    SHA512

    f01916ded59752b7ad45df8e2c83e9a809b0fd1de8f17863c973f9139ba4e4ac18aedef97c196ad782a6e733faafd9fcdd5447c82ec71676deb0f1d86097d203

  • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

    SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

    SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

    SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

  • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

    SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

    SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

    SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

  • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

    SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

    SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

    SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

  • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

    SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

    SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

    SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

  • C:\Users\Admin\AppData\Local\60d3d90a-bf23-419d-b2db-adc9c1476bdc\570fbe91fdd6d1eb8cfd2f03c032cdde.exe
    MD5

    570fbe91fdd6d1eb8cfd2f03c032cdde

    SHA1

    59d07617c682fed330d82b1d97f1bf32c30c6ff1

    SHA256

    b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61

    SHA512

    e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6

  • memory/384-71-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/384-68-0x0000000000424141-mapping.dmp
  • memory/640-64-0x0000000000000000-mapping.dmp
  • memory/972-75-0x0000000000424141-mapping.dmp
  • memory/1088-62-0x0000000001DE0000-0x0000000001EFB000-memory.dmp
    Filesize

    1.1MB

  • memory/1312-66-0x0000000000000000-mapping.dmp
  • memory/1364-80-0x0000000000000000-mapping.dmp
  • memory/1424-83-0x0000000000424141-mapping.dmp
  • memory/1708-72-0x0000000000000000-mapping.dmp
  • memory/1708-59-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-63-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-61-0x0000000075281000-0x0000000075283000-memory.dmp
    Filesize

    8KB

  • memory/1708-60-0x0000000000424141-mapping.dmp