Analysis
-
max time kernel
108s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
30-11-2021 07:29
Static task
static1
Behavioral task
behavioral1
Sample
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe
Resource
win10-en-20211014
General
-
Target
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe
-
Size
706KB
-
MD5
affc5f8ed8092772c39366f339521584
-
SHA1
defc52ea0693afffacc8593172e558f82f87cb5b
-
SHA256
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb
-
SHA512
d006d6691054fef51ab4359fe8806ea82ac88e9841da22214b35426f7a0cd8bbfd5ef373576a38a1db53a1d331e691e188611b30bbbc1b07bfb44a64892f0b52
Malware Config
Extracted
djvu
http://tzgl.org/fhsgtsspen6/get.php
-
extension
.moia
-
offline_id
K3PMMX2aWwpnYby88Dzg7tmaIW7Tv0HMWvSyr7t1
-
payload_url
http://kotob.top/dl/build2.exe
http://tzgl.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-rIyEiK9ekc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0355gSd743d
Signatures
-
Detected Djvu ransomware 6 IoCs
Processes:
resource yara_rule behavioral1/memory/3800-115-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3800-116-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/2808-118-0x0000000004B60000-0x0000000004C7B000-memory.dmp family_djvu behavioral1/memory/3800-119-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/480-124-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/480-129-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\28a22360-8afd-494c-bc6e-3895d0d28320\\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe\" --AutoStart" d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 api.2ip.ua 9 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exed2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exedescription pid process target process PID 2808 set thread context of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 set thread context of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exed2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exepid process 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe 480 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe 480 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exed2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exed2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exedescription pid process target process PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 2808 wrote to memory of 3800 2808 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3800 wrote to memory of 1280 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe icacls.exe PID 3800 wrote to memory of 1280 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe icacls.exe PID 3800 wrote to memory of 1280 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe icacls.exe PID 3800 wrote to memory of 3684 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3800 wrote to memory of 3684 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3800 wrote to memory of 3684 3800 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe PID 3684 wrote to memory of 480 3684 d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\28a22360-8afd-494c-bc6e-3895d0d28320" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe"C:\Users\Admin\AppData\Local\Temp\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
PID:480
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5e15da05c12224abc690b1eb313a20137
SHA180f6284e35fa09eda4e69a5a866f052c9077e1f1
SHA2569708014af393827b1df1614e6d4d99de56f13fbda613e2ead63416a9c2c6e31c
SHA5124d41f757804943d5344476747024dd94aaa6d414d9b1652f9865927234d40c271a42468cde38c2bd68f6e833783ae8ea93727d2eb9e8c24263673eb8dd6b9937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD52bef96fbf39da6a765ed4d36db41fc5a
SHA1af8b93b370a8bfd932552f840d54da310b51c071
SHA2569cf840b96cb69e5c7f2b93630f63e44c20ba7240ce29ffa7e5de6e648c57d3c8
SHA512a05166997abf2f29a1867f2ed649555eb5b153448087025b0d1a77cc14f78da0052a81bfd44d360731ca8b6520646b0d3e51e8fbbc2e045b990505dd46fa24d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5379a49ecab79105e8bc21cf76e94d999
SHA11fc724f6f71045f6602d8ef82ab25aee688ca265
SHA2568f7f51d29197a95d83867c6bc5bdbf3d0d0445a9d6e95a3396eb6ea9f0014105
SHA512640e7e127840f322f4519ee36a32dce4beb3345b03dca47c835d39991e9d5f77a6ee862250dbad35f316062e447577b87402983db489505456758adf66e88d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD58983d48d354e9e4f58ff34a13d2445f7
SHA1a9d206a52ff3326aac81485ed6e8260f7a48900b
SHA256821b3031f40a5b9979162fd6a1b4da40fa8c53c499b37218b66ce03202679629
SHA512a61dd1532f3f9eb31e87d8a646cb4ecacf396a229a7d73a20b1a0d47010439ccdd0f435bbaeefe6a12e7fd42787aea530558c38c6c0c88c407457be85a001172
-
C:\Users\Admin\AppData\Local\28a22360-8afd-494c-bc6e-3895d0d28320\d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb.exe
MD5affc5f8ed8092772c39366f339521584
SHA1defc52ea0693afffacc8593172e558f82f87cb5b
SHA256d2b456c5e420136d6738296215031595cc1c8ee207c82705e7bab74af2455acb
SHA512d006d6691054fef51ab4359fe8806ea82ac88e9841da22214b35426f7a0cd8bbfd5ef373576a38a1db53a1d331e691e188611b30bbbc1b07bfb44a64892f0b52