Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-08-2021 01:24
Static task
static1
Behavioral task
behavioral1
Sample
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe
Resource
win10v20210408
General
-
Target
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe
-
Size
722KB
-
MD5
55c13e0408310276dcb7a5356262a987
-
SHA1
d7d15e0d6298572a83a26ee67bf5488b93cabb05
-
SHA256
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b
-
SHA512
52ac50b3c74d827dce52d44b2f47fbf24a4f5b9eedb32bb5e1126acf49cfb5bc4946cb4259b868d22b934524b0e84553a8df5b688acee1e750180e014fee27b1
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-ykQaS2tRyB
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Signatures
-
Detected Djvu ransomeware 8 IoCs
resource yara_rule behavioral1/memory/3128-114-0x0000000004B80000-0x0000000004C9B000-memory.dmp family_djvu behavioral1/memory/2916-115-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2916-116-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/2916-117-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2072-122-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/2072-127-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2080-169-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/2080-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/1296-131-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/1296-132-0x000000000046B77D-mapping.dmp family_vidar behavioral1/memory/2300-134-0x0000000002670000-0x000000000270E000-memory.dmp family_vidar behavioral1/memory/1296-135-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/2188-145-0x0000000003250000-0x00000000032FE000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2300 build2.exe 1296 build2.exe 2188 build3.exe 1732 build3.exe 3936 mstsca.exe 3788 mstsca.exe 4040 mstsca.exe 1640 mstsca.exe 1736 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2080 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertToUnregister.png => C:\Users\Admin\Pictures\ConvertToUnregister.png.orkf 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File opened for modification C:\Users\Admin\Pictures\DisableClose.tiff 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File renamed C:\Users\Admin\Pictures\DisableClose.tiff => C:\Users\Admin\Pictures\DisableClose.tiff.orkf 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File renamed C:\Users\Admin\Pictures\ReceiveCompress.tif => C:\Users\Admin\Pictures\ReceiveCompress.tif.orkf 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File opened for modification C:\Users\Admin\Pictures\RenameRemove.tiff 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File renamed C:\Users\Admin\Pictures\RenameRemove.tiff => C:\Users\Admin\Pictures\RenameRemove.tiff.orkf 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File opened for modification C:\Users\Admin\Pictures\StepGroup.tiff 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe File renamed C:\Users\Admin\Pictures\StepGroup.tiff => C:\Users\Admin\Pictures\StepGroup.tiff.orkf 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 build2.exe 1296 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 928 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9\\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe\" --AutoStart" 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.2ip.ua 19 api.2ip.ua 36 api.2ip.ua 8 api.2ip.ua -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3128 set thread context of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3724 set thread context of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 2300 set thread context of 1296 2300 build2.exe 84 PID 2188 set thread context of 1732 2188 build3.exe 86 PID 3936 set thread context of 3788 3936 mstsca.exe 94 PID 4040 set thread context of 1640 4040 mstsca.exe 98 PID 1736 set thread context of 2080 1736 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2136 schtasks.exe 1260 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1184 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2204 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 1296 build2.exe 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2080 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 2080 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 3128 wrote to memory of 2916 3128 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 77 PID 2916 wrote to memory of 928 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 78 PID 2916 wrote to memory of 928 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 78 PID 2916 wrote to memory of 928 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 78 PID 2916 wrote to memory of 3724 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 79 PID 2916 wrote to memory of 3724 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 79 PID 2916 wrote to memory of 3724 2916 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 79 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 3724 wrote to memory of 2072 3724 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 82 PID 2072 wrote to memory of 2300 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 83 PID 2072 wrote to memory of 2300 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 83 PID 2072 wrote to memory of 2300 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 83 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2300 wrote to memory of 1296 2300 build2.exe 84 PID 2072 wrote to memory of 2188 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 85 PID 2072 wrote to memory of 2188 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 85 PID 2072 wrote to memory of 2188 2072 01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe 85 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 2188 wrote to memory of 1732 2188 build3.exe 86 PID 1732 wrote to memory of 2136 1732 build3.exe 87 PID 1732 wrote to memory of 2136 1732 build3.exe 87 PID 1732 wrote to memory of 2136 1732 build3.exe 87 PID 1296 wrote to memory of 2624 1296 build2.exe 89 PID 1296 wrote to memory of 2624 1296 build2.exe 89 PID 1296 wrote to memory of 2624 1296 build2.exe 89 PID 2624 wrote to memory of 2204 2624 cmd.exe 91 PID 2624 wrote to memory of 2204 2624 cmd.exe 91 PID 2624 wrote to memory of 2204 2624 cmd.exe 91 PID 2624 wrote to memory of 1184 2624 cmd.exe 92 PID 2624 wrote to memory of 1184 2624 cmd.exe 92 PID 2624 wrote to memory of 1184 2624 cmd.exe 92 PID 3936 wrote to memory of 3788 3936 mstsca.exe 94 PID 3936 wrote to memory of 3788 3936 mstsca.exe 94 PID 3936 wrote to memory of 3788 3936 mstsca.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe"C:\Users\Admin\AppData\Local\Temp\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build2.exe"C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build2.exe"C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:1184
-
-
-
-
-
C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build3.exe"C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build3.exe"C:\Users\Admin\AppData\Local\befd9e9d-74eb-43e8-9df2-b867ca45cc0d\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2136
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
PID:1260
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4040 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exeC:\Users\Admin\AppData\Local\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1736 -
C:\Users\Admin\AppData\Local\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exeC:\Users\Admin\AppData\Local\8bcc96f3-0c3c-411c-a05a-cbc01bf3e7d9\01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe --Task2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2080
-