Analysis
-
max time kernel
66s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-06-2021 14:07
Static task
static1
Behavioral task
behavioral1
Sample
6b7829cb6f27c9382e48822f36ce2b03.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
6b7829cb6f27c9382e48822f36ce2b03.exe
Resource
win10v20210410
General
-
Target
6b7829cb6f27c9382e48822f36ce2b03.exe
-
Size
859KB
-
MD5
6b7829cb6f27c9382e48822f36ce2b03
-
SHA1
190cd052a6de77dfa081172a7917dde892632d97
-
SHA256
3e4676b65c821a9509ba52b43e12248a75cc8f68b212d9852786cc6424003d60
-
SHA512
3a1f2edd75ed62939cfe4a3becef1cf844fbd9e04786e007f13688812dd8f292561b2092153f1ab19d46fa1a20163805184ddbdea9dda8dbc23963525362909b
Malware Config
Extracted
vidar
39.3
517
https://bandakere.tumblr.com/
-
profile_id
517
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2084 mpcmdrun.exe -
Detected Djvu ransomeware 6 IoCs
resource yara_rule behavioral2/memory/3692-114-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3692-115-0x0000000000424141-mapping.dmp family_djvu behavioral2/memory/4056-116-0x0000000002250000-0x000000000236B000-memory.dmp family_djvu behavioral2/memory/3692-117-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1868-122-0x0000000000424141-mapping.dmp family_djvu behavioral2/memory/1868-128-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/3808-147-0x0000000000400000-0x000000000049B000-memory.dmp family_vidar behavioral2/memory/3808-148-0x00000000004680AD-mapping.dmp family_vidar behavioral2/memory/4092-156-0x0000000002170000-0x0000000002208000-memory.dmp family_vidar behavioral2/memory/3808-157-0x0000000000400000-0x000000000049B000-memory.dmp family_vidar -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Executes dropped EXE 5 IoCs
pid Process 3568 updatewin1.exe 2392 updatewin2.exe 2444 updatewin1.exe 4092 5.exe 3808 5.exe -
Loads dropped DLL 2 IoCs
pid Process 3808 5.exe 3808 5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2068 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\aeca3fbb-7ce2-4980-ad83-eb269b28c93a\\6b7829cb6f27c9382e48822f36ce2b03.exe\" --AutoStart" 6b7829cb6f27c9382e48822f36ce2b03.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.2ip.ua 10 api.2ip.ua 21 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4056 set thread context of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 2428 set thread context of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 4092 set thread context of 3808 4092 5.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2236 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 364 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6b7829cb6f27c9382e48822f36ce2b03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6b7829cb6f27c9382e48822f36ce2b03.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 1292 powershell.exe 1292 powershell.exe 1292 powershell.exe 3808 5.exe 3808 5.exe 3808 5.exe 3808 5.exe 3808 5.exe 3808 5.exe 3808 5.exe 3808 5.exe 1292 powershell.exe 2340 powershell.exe 2340 powershell.exe 2340 powershell.exe 1556 powershell.exe 1556 powershell.exe 1556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 364 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 4056 wrote to memory of 3692 4056 6b7829cb6f27c9382e48822f36ce2b03.exe 78 PID 3692 wrote to memory of 2068 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 79 PID 3692 wrote to memory of 2068 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 79 PID 3692 wrote to memory of 2068 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 79 PID 3692 wrote to memory of 2428 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 80 PID 3692 wrote to memory of 2428 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 80 PID 3692 wrote to memory of 2428 3692 6b7829cb6f27c9382e48822f36ce2b03.exe 80 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 2428 wrote to memory of 1868 2428 6b7829cb6f27c9382e48822f36ce2b03.exe 82 PID 1868 wrote to memory of 3568 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 84 PID 1868 wrote to memory of 3568 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 84 PID 1868 wrote to memory of 3568 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 84 PID 1868 wrote to memory of 2392 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 85 PID 1868 wrote to memory of 2392 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 85 PID 1868 wrote to memory of 2392 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 85 PID 3568 wrote to memory of 2444 3568 updatewin1.exe 86 PID 3568 wrote to memory of 2444 3568 updatewin1.exe 86 PID 3568 wrote to memory of 2444 3568 updatewin1.exe 86 PID 1868 wrote to memory of 4092 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 87 PID 1868 wrote to memory of 4092 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 87 PID 1868 wrote to memory of 4092 1868 6b7829cb6f27c9382e48822f36ce2b03.exe 87 PID 2444 wrote to memory of 1292 2444 updatewin1.exe 88 PID 2444 wrote to memory of 1292 2444 updatewin1.exe 88 PID 2444 wrote to memory of 1292 2444 updatewin1.exe 88 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 4092 wrote to memory of 3808 4092 5.exe 90 PID 2444 wrote to memory of 2340 2444 updatewin1.exe 91 PID 2444 wrote to memory of 2340 2444 updatewin1.exe 91 PID 2444 wrote to memory of 2340 2444 updatewin1.exe 91 PID 2340 wrote to memory of 1556 2340 powershell.exe 93 PID 2340 wrote to memory of 1556 2340 powershell.exe 93 PID 2340 wrote to memory of 1556 2340 powershell.exe 93 PID 2444 wrote to memory of 2084 2444 updatewin1.exe 95 PID 2444 wrote to memory of 2084 2444 updatewin1.exe 95 PID 2444 wrote to memory of 1964 2444 updatewin1.exe 97 PID 2444 wrote to memory of 1964 2444 updatewin1.exe 97 PID 2444 wrote to memory of 1964 2444 updatewin1.exe 97 PID 3808 wrote to memory of 3896 3808 5.exe 99 PID 3808 wrote to memory of 3896 3808 5.exe 99 PID 3808 wrote to memory of 3896 3808 5.exe 99 PID 3896 wrote to memory of 364 3896 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\aeca3fbb-7ce2-4980-ad83-eb269b28c93a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe"C:\Users\Admin\AppData\Local\Temp\6b7829cb6f27c9382e48822f36ce2b03.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin1.exe"C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin1.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin1.exe"C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin1.exe" --Admin6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Program Files\Windows Defender\mpcmdrun.exe"C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all7⤵
- Deletes Windows Defender Definitions
PID:2084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""7⤵PID:1964
-
-
-
-
C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin2.exe"C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\updatewin2.exe"5⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2392
-
-
C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\5.exe"C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\5.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\5.exe"C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\5.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\dfd1f9f7-f4bc-433f-95e7-4a5c87d0ab5f\5.exe" & del C:\ProgramData\*.dll & exit7⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:2236
-
-
-
-
-
-
-