Analysis

  • max time kernel
    67s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 15:03

General

  • Target

    c80ad6ada1635b8bca10287561eeae15.exe

  • Size

    693KB

  • MD5

    c80ad6ada1635b8bca10287561eeae15

  • SHA1

    adcdbf7bffc69fb590785637a9a78a195421a375

  • SHA256

    e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

  • SHA512

    b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

Malware Config

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
    "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
      "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\90e727f6-d0f2-4c46-88ba-10431bf9599d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1236
      • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
        "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe
          "C:\Users\Admin\AppData\Local\Temp\c80ad6ada1635b8bca10287561eeae15.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1800

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    57ba3fd55153ccfffc38981d45eb27ef

    SHA1

    8b89079e2a405fe04a1a87fe901d88982ef516cb

    SHA256

    19d84b87ec3acb0894fbbb2c95b23053373568282aa6817da64607ed3225dcef

    SHA512

    58ae33ebb38e6bec6332b9085f8b41850b53d7de804bc87a462f9ce7b1e960051d3682fb87a14c159041a7577a36af95cb2edf971e4d23c902d583da9945c0b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    3f5ce173eed18d061760acea4c8f69f3

    SHA1

    c8a02499ede88cb10496fbbc77fee1f2757e6629

    SHA256

    b7666f21ebc73a75f02fefbf7d6f17700897b69301eae07ce4bab6b32ab107c8

    SHA512

    22f7b2af2a230e7f6ae2830d27b5769c07f0c3f8d327cfb6be6a4c632af012e823e303514c62dac8f70c973e4df81aeba10138a930d4a8880caf18c8a7062d24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    57947eb0a7ec4e30e160f26f6ec52f14

    SHA1

    60deefaad68596b030dbf699933f285153d58447

    SHA256

    210664441cb2c53da66862f12c1e7d7cc410077f85af087b13cbafbe33390010

    SHA512

    0dad47476ecab60e07684f690f4e1fc07c58ef9ab63840f48f4d8a4f91372081cf1400e220655e38d2c4c891e548c35eb48c52d2a91379addfc5d77f4a6c7ac7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    9ae70e68a95ba552b9739980c86b3e9e

    SHA1

    c306d157d7698552e6e89684d3fe91c463287143

    SHA256

    61c833a8e3255f22a73bd2bb9409776eb092d5f0c25ba6c5566a0825370f5f2f

    SHA512

    000fd333fe9204e4b0e17b01d48e19618559e4b10ccb3de7b6a7f366a3de796cb4b81af73a8301bd88e8af9001783aed74db50dc8685ed528788e8a549ec3105

  • C:\Users\Admin\AppData\Local\90e727f6-d0f2-4c46-88ba-10431bf9599d\c80ad6ada1635b8bca10287561eeae15.exe
    MD5

    c80ad6ada1635b8bca10287561eeae15

    SHA1

    adcdbf7bffc69fb590785637a9a78a195421a375

    SHA256

    e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

    SHA512

    b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

  • memory/644-116-0x0000000002210000-0x000000000232B000-memory.dmp
    Filesize

    1.1MB

  • memory/908-117-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/908-115-0x0000000000424141-mapping.dmp
  • memory/908-114-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1236-118-0x0000000000000000-mapping.dmp
  • memory/1484-120-0x0000000000000000-mapping.dmp
  • memory/1800-122-0x0000000000424141-mapping.dmp
  • memory/1800-127-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB