Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    26-09-2021 15:03

General

  • Target

    c80ad6ada1635b8bca10287561eeae15.exe

  • Size

    693KB

  • MD5

    c80ad6ada1635b8bca10287561eeae15

  • SHA1

    adcdbf7bffc69fb590785637a9a78a195421a375

  • SHA256

    e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

  • SHA512

    b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

Malware Config

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
    "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
      "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\51175cde-ef7e-46d1-81f2-e2575b079f56" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
        "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
          "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1796

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    57ba3fd55153ccfffc38981d45eb27ef

    SHA1

    8b89079e2a405fe04a1a87fe901d88982ef516cb

    SHA256

    19d84b87ec3acb0894fbbb2c95b23053373568282aa6817da64607ed3225dcef

    SHA512

    58ae33ebb38e6bec6332b9085f8b41850b53d7de804bc87a462f9ce7b1e960051d3682fb87a14c159041a7577a36af95cb2edf971e4d23c902d583da9945c0b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    3f5ce173eed18d061760acea4c8f69f3

    SHA1

    c8a02499ede88cb10496fbbc77fee1f2757e6629

    SHA256

    b7666f21ebc73a75f02fefbf7d6f17700897b69301eae07ce4bab6b32ab107c8

    SHA512

    22f7b2af2a230e7f6ae2830d27b5769c07f0c3f8d327cfb6be6a4c632af012e823e303514c62dac8f70c973e4df81aeba10138a930d4a8880caf18c8a7062d24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    303361333672ba3b50fe36b43b02e607

    SHA1

    49e13caeb47304c673b61f1be9c6741c59c79770

    SHA256

    bbffa4861bd5b16a21091e665425186b9cf1865a4c0e2574e9d23ac0c395efcd

    SHA512

    7b449ee68e5fe315dabb0a199437514c2e4cd2f9987e83fabb190f45c18e6c4ae8ef0e480f6e8b6dd293467a0589bf923471d51fcd861d8827955af9303b4363

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    9a95d5df807e5075ac21dc35b8734251

    SHA1

    8b88b6430fae817851531848b24224a163e69d53

    SHA256

    c2a209bd34ca8739c517498d2fbda4d14c781a98b9d7960657c213451c68cf59

    SHA512

    1f38c48f1a97c7b055f151b19c0c1a97dd3eea6a5196319abf3b202302ec2d4319ef17d7cd148837fc3a6e32c92733538f642de3dd9311f00d13d9fed11ed263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    88c36d0ff9dd99a9aee01db5de2e1d8b

    SHA1

    b870cc0d11f04c2fe1263ce028e00515c130fedf

    SHA256

    dd4ad160a7f65b064219007c706796c2d0df746cec3e266de25cbb840fae85c4

    SHA512

    9da943d1f977fbf286a4b6032b85ead08ec64a2d78745839783ecd8857839cccbdc86cb10e32da9affe1460bdaa7824cd093d5f3a896851a0e7eed0e4b47476f

  • C:\Users\Admin\AppData\Local\51175cde-ef7e-46d1-81f2-e2575b079f56\c80ad6ada1635b8bca10287561eeae15.exe
    MD5

    c80ad6ada1635b8bca10287561eeae15

    SHA1

    adcdbf7bffc69fb590785637a9a78a195421a375

    SHA256

    e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

    SHA512

    b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

  • memory/832-57-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/832-54-0x0000000000424141-mapping.dmp
  • memory/832-55-0x0000000075BF1000-0x0000000075BF3000-memory.dmp
    Filesize

    8KB

  • memory/832-53-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1184-58-0x0000000000000000-mapping.dmp
  • memory/1464-60-0x0000000000000000-mapping.dmp
  • memory/1564-56-0x0000000001EC0000-0x0000000001FDB000-memory.dmp
    Filesize

    1.1MB

  • memory/1796-62-0x0000000000424141-mapping.dmp
  • memory/1796-64-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB