Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-08-2021 14:45
Static task
static1
Behavioral task
behavioral1
Sample
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe
Resource
win10v20210408
General
-
Target
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe
-
Size
721KB
-
MD5
92baa6d072d591b827950b6bc4730057
-
SHA1
17e968a7d200a75fcec9b6967bd635d8633405d9
-
SHA256
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49
-
SHA512
21cd5c7c535b333c6e7297f0edb1d03cad96c24114d3318b6943c0af57c81e2486c6056103617222c3c7650ce666945c7fb4080947ae4946219acf229cd3f0da
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-ykQaS2tRyB
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Signatures
-
Detected Djvu ransomeware 8 IoCs
resource yara_rule behavioral1/memory/3148-114-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3148-115-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/900-116-0x0000000004AB0000-0x0000000004BCB000-memory.dmp family_djvu behavioral1/memory/3148-117-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3832-122-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/3832-127-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-169-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/644-171-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/1824-132-0x000000000046B77D-mapping.dmp family_vidar behavioral1/memory/1824-131-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/1824-135-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/3464-134-0x0000000002480000-0x000000000252E000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3464 build2.exe 1824 build2.exe 1924 build3.exe 4064 build3.exe 508 mstsca.exe 3820 mstsca.exe 564 mstsca.exe 2208 mstsca.exe 2384 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 644 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ExportWrite.crw => C:\Users\Admin\Pictures\ExportWrite.crw.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe File renamed C:\Users\Admin\Pictures\RenameUse.crw => C:\Users\Admin\Pictures\RenameUse.crw.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe File renamed C:\Users\Admin\Pictures\ShowStep.tif => C:\Users\Admin\Pictures\ShowStep.tif.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe File renamed C:\Users\Admin\Pictures\TestRestore.tif => C:\Users\Admin\Pictures\TestRestore.tif.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe File renamed C:\Users\Admin\Pictures\ConvertFromStop.raw => C:\Users\Admin\Pictures\ConvertFromStop.raw.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe File renamed C:\Users\Admin\Pictures\DenyRevoke.crw => C:\Users\Admin\Pictures\DenyRevoke.crw.orkf 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 build2.exe 1824 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2936 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c1df307e-a78e-414f-86dc-9441c03b3e34\\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe\" --AutoStart" 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.2ip.ua 11 api.2ip.ua 22 api.2ip.ua 39 api.2ip.ua -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 900 set thread context of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 1352 set thread context of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 3464 set thread context of 1824 3464 build2.exe 84 PID 1924 set thread context of 4064 1924 build3.exe 86 PID 508 set thread context of 3820 508 mstsca.exe 94 PID 564 set thread context of 2208 564 mstsca.exe 98 PID 2384 set thread context of 644 2384 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3812 schtasks.exe 3480 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4080 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 716 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 1824 build2.exe 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 644 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 644 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 716 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 900 wrote to memory of 3148 900 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 77 PID 3148 wrote to memory of 2936 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 78 PID 3148 wrote to memory of 2936 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 78 PID 3148 wrote to memory of 2936 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 78 PID 3148 wrote to memory of 1352 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 79 PID 3148 wrote to memory of 1352 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 79 PID 3148 wrote to memory of 1352 3148 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 79 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 1352 wrote to memory of 3832 1352 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 82 PID 3832 wrote to memory of 3464 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 83 PID 3832 wrote to memory of 3464 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 83 PID 3832 wrote to memory of 3464 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 83 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3464 wrote to memory of 1824 3464 build2.exe 84 PID 3832 wrote to memory of 1924 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 85 PID 3832 wrote to memory of 1924 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 85 PID 3832 wrote to memory of 1924 3832 91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe 85 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 1924 wrote to memory of 4064 1924 build3.exe 86 PID 4064 wrote to memory of 3812 4064 build3.exe 87 PID 4064 wrote to memory of 3812 4064 build3.exe 87 PID 4064 wrote to memory of 3812 4064 build3.exe 87 PID 1824 wrote to memory of 192 1824 build2.exe 89 PID 1824 wrote to memory of 192 1824 build2.exe 89 PID 1824 wrote to memory of 192 1824 build2.exe 89 PID 192 wrote to memory of 716 192 cmd.exe 91 PID 192 wrote to memory of 716 192 cmd.exe 91 PID 192 wrote to memory of 716 192 cmd.exe 91 PID 192 wrote to memory of 4080 192 cmd.exe 92 PID 192 wrote to memory of 4080 192 cmd.exe 92 PID 192 wrote to memory of 4080 192 cmd.exe 92 PID 508 wrote to memory of 3820 508 mstsca.exe 94 PID 508 wrote to memory of 3820 508 mstsca.exe 94 PID 508 wrote to memory of 3820 508 mstsca.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c1df307e-a78e-414f-86dc-9441c03b3e34" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe"C:\Users\Admin\AppData\Local\Temp\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build2.exe"C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build2.exe"C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
- Suspicious use of WriteProcessMemory
PID:192 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4080
-
-
-
-
-
C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build3.exe"C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build3.exe"C:\Users\Admin\AppData\Local\d6e72f6e-67c6-4b14-aeac-e35e85c271f3\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:3812
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
PID:3480
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:564 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\c1df307e-a78e-414f-86dc-9441c03b3e34\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exeC:\Users\Admin\AppData\Local\c1df307e-a78e-414f-86dc-9441c03b3e34\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2384 -
C:\Users\Admin\AppData\Local\c1df307e-a78e-414f-86dc-9441c03b3e34\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exeC:\Users\Admin\AppData\Local\c1df307e-a78e-414f-86dc-9441c03b3e34\91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe --Task2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:644
-