Analysis

  • max time kernel
    111s
  • max time network
    161s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    23-10-2021 00:11

General

  • Target

    0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe

  • Size

    853KB

  • MD5

    3fd16b7520f0745f627759902b155046

  • SHA1

    adba005434422ebb6b43636f457772c00c55c3a3

  • SHA256

    0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052

  • SHA512

    88e68df7eb827c261f6aec5c045a84dcfa281fbea990a1de7a15af39fcbbb88643d37da026182f5f3a5a16ac7d7b1464d3cce19f912de255c33ec9c47b935ef5

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

517

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    517

Extracted

Family

djvu

C2

http://rlrz.org/fhsgtsspen6

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • Vidar Stealer 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe
    "C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe
      "C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\74190f66-3d2d-47b6-bfce-683972c2fada" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:660
      • C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe
        "C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe
          "C:\Users\Admin\AppData\Local\Temp\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe
            "C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2156
            • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe
              "C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:1072
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 1080
                7⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3032
          • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe
            "C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:944
            • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe
              "C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1244
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:1384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\74190f66-3d2d-47b6-bfce-683972c2fada\0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052.exe
    MD5

    3fd16b7520f0745f627759902b155046

    SHA1

    adba005434422ebb6b43636f457772c00c55c3a3

    SHA256

    0be6d1985b2f07f46781a3554ae9fddb1e93b153145dd5cd33035c70e25b0052

    SHA512

    88e68df7eb827c261f6aec5c045a84dcfa281fbea990a1de7a15af39fcbbb88643d37da026182f5f3a5a16ac7d7b1464d3cce19f912de255c33ec9c47b935ef5

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe
    MD5

    a2ef57bbe3a8af95196a419a7962bfaa

    SHA1

    1a0c42723cd1e2e947f904619de7fcea5ca4a183

    SHA256

    4bc52cd8296fcffc22b5ca8ebf2b161260d71c8d34658f45c9c93cf6d65749e9

    SHA512

    ca4781632cc0fb2c53f1ae0d0b798da386514f58b6a48845197eea05da7af162405dee1d4b139e661798c29a095e50cdde9f193dea4a9c5366ee763a899ac160

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe
    MD5

    a2ef57bbe3a8af95196a419a7962bfaa

    SHA1

    1a0c42723cd1e2e947f904619de7fcea5ca4a183

    SHA256

    4bc52cd8296fcffc22b5ca8ebf2b161260d71c8d34658f45c9c93cf6d65749e9

    SHA512

    ca4781632cc0fb2c53f1ae0d0b798da386514f58b6a48845197eea05da7af162405dee1d4b139e661798c29a095e50cdde9f193dea4a9c5366ee763a899ac160

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build2.exe
    MD5

    a2ef57bbe3a8af95196a419a7962bfaa

    SHA1

    1a0c42723cd1e2e947f904619de7fcea5ca4a183

    SHA256

    4bc52cd8296fcffc22b5ca8ebf2b161260d71c8d34658f45c9c93cf6d65749e9

    SHA512

    ca4781632cc0fb2c53f1ae0d0b798da386514f58b6a48845197eea05da7af162405dee1d4b139e661798c29a095e50cdde9f193dea4a9c5366ee763a899ac160

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe
    MD5

    0fea771099e342facd95a9d659548919

    SHA1

    9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

    SHA256

    6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

    SHA512

    2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe
    MD5

    0fea771099e342facd95a9d659548919

    SHA1

    9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

    SHA256

    6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

    SHA512

    2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

  • C:\Users\Admin\AppData\Local\751555ec-a224-4408-bdc8-b99a5801e555\build3.exe
    MD5

    0fea771099e342facd95a9d659548919

    SHA1

    9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

    SHA256

    6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

    SHA512

    2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

  • memory/660-120-0x0000000000000000-mapping.dmp
  • memory/944-144-0x0000000003330000-0x0000000003334000-memory.dmp
    Filesize

    16KB

  • memory/944-136-0x0000000000000000-mapping.dmp
  • memory/1072-131-0x0000000000400000-0x00000000004D9000-memory.dmp
    Filesize

    868KB

  • memory/1072-132-0x00000000004A18CD-mapping.dmp
  • memory/1072-135-0x0000000000400000-0x00000000004D9000-memory.dmp
    Filesize

    868KB

  • memory/1244-141-0x0000000000401AFA-mapping.dmp
  • memory/1244-140-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/1244-145-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/1384-143-0x0000000000000000-mapping.dmp
  • memory/1444-119-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1444-117-0x0000000000424141-mapping.dmp
  • memory/1444-116-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2156-130-0x0000000003329000-0x00000000033A5000-memory.dmp
    Filesize

    496KB

  • memory/2156-134-0x0000000004CB0000-0x0000000004D86000-memory.dmp
    Filesize

    856KB

  • memory/2156-127-0x0000000000000000-mapping.dmp
  • memory/3648-115-0x0000000000EB9000-0x0000000000F4B000-memory.dmp
    Filesize

    584KB

  • memory/3648-118-0x0000000000F90000-0x00000000010AB000-memory.dmp
    Filesize

    1.1MB

  • memory/3944-123-0x0000000000E35000-0x0000000000EC7000-memory.dmp
    Filesize

    584KB

  • memory/3944-122-0x0000000000000000-mapping.dmp
  • memory/3976-126-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/3976-125-0x0000000000424141-mapping.dmp