Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
29-11-2021 03:51
Static task
static1
Behavioral task
behavioral1
Sample
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe
Resource
win10-en-20211014
General
-
Target
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe
-
Size
846KB
-
MD5
fcdf499b0dfa16a745f5b4005b83a483
-
SHA1
c5321dafd9ef34cea7c9ef0e054d694a698e8a39
-
SHA256
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784
-
SHA512
7fc2da1d21e893ffdfab5eb140b55675c81c1ea16e1598f3cbf61003ce08de99c20afed854fd430838cd9bd21dd603c00d03adb19ed355e60af0025f12d5612b
Malware Config
Extracted
djvu
http://tzgl.org/lancer/get.php
-
extension
.robm
-
offline_id
Z5GGASEfY71jtxU3i3E8kzvrTJmY9oiZkjcSm0t1
-
payload_url
http://kotob.top/dl/build2.exe
http://tzgl.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-Tjb0YqckGX Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0354gSd743d
Signatures
-
Detected Djvu ransomware 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2808-116-0x0000000003900000-0x0000000003A1B000-memory.dmp family_djvu behavioral1/memory/2696-118-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/2696-117-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2696-119-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3268-125-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/3268-126-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e33c132c-9904-4c96-962e-03fbb4828547\\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe\" --AutoStart" 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 api.2ip.ua 9 api.2ip.ua 22 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
Processes:
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exedescription pid process target process PID 2808 set thread context of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 set thread context of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exepid process 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 3268 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 3268 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exedescription pid process target process PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2808 wrote to memory of 2696 2808 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2696 wrote to memory of 800 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe icacls.exe PID 2696 wrote to memory of 800 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe icacls.exe PID 2696 wrote to memory of 800 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe icacls.exe PID 2696 wrote to memory of 812 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2696 wrote to memory of 812 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 2696 wrote to memory of 812 2696 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe PID 812 wrote to memory of 3268 812 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe 445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e33c132c-9904-4c96-962e-03fbb4828547" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe"C:\Users\Admin\AppData\Local\Temp\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5e15da05c12224abc690b1eb313a20137
SHA180f6284e35fa09eda4e69a5a866f052c9077e1f1
SHA2569708014af393827b1df1614e6d4d99de56f13fbda613e2ead63416a9c2c6e31c
SHA5124d41f757804943d5344476747024dd94aaa6d414d9b1652f9865927234d40c271a42468cde38c2bd68f6e833783ae8ea93727d2eb9e8c24263673eb8dd6b9937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD52bef96fbf39da6a765ed4d36db41fc5a
SHA1af8b93b370a8bfd932552f840d54da310b51c071
SHA2569cf840b96cb69e5c7f2b93630f63e44c20ba7240ce29ffa7e5de6e648c57d3c8
SHA512a05166997abf2f29a1867f2ed649555eb5b153448087025b0d1a77cc14f78da0052a81bfd44d360731ca8b6520646b0d3e51e8fbbc2e045b990505dd46fa24d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD56f71b47e78334cf18e03d98fa3ef98cd
SHA1a1a714f5f108bfa435390054b04000f47b9ad277
SHA25641e804095dc42c695ccde8f5ef796fec3e842f3306ad1208d8b8e5fc9304e475
SHA5124edea70fd65d16a61c8ebab907f67ab77902e1dfed6b61c045700146dbb2c6b6ebd6693609e7d52353c2fbd8ac1b6f1ca7873c549c85282623a875911b9b4acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5917bbea84f8b0054bd9ca1bf61a0187f
SHA120bb19d2cdb9d92a9620623cbb97d0834b9157e4
SHA256f34a6af2f4ecbad6902aed202b503cf9fbfaa1e38c32863f63f19e384f1e8a65
SHA512d308746d9bcd1888e8d5c5aacb0ddd0f2da50188c6be7fbd7ddfaeca3e6d7769c117567077bf2dbd0a14dd47e38a8ab4a9d615b13c92d0bee14df1ee8a9c248d
-
C:\Users\Admin\AppData\Local\e33c132c-9904-4c96-962e-03fbb4828547\445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784.exe
MD5fcdf499b0dfa16a745f5b4005b83a483
SHA1c5321dafd9ef34cea7c9ef0e054d694a698e8a39
SHA256445ab4c4531ef255deb0ac9d90de7c7c5c3f67fe65a0b8f2a7f1c0e8c3297784
SHA5127fc2da1d21e893ffdfab5eb140b55675c81c1ea16e1598f3cbf61003ce08de99c20afed854fd430838cd9bd21dd603c00d03adb19ed355e60af0025f12d5612b