Analysis

  • max time kernel
    52s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    04-12-2021 11:13

General

  • Target

    ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe

  • Size

    797KB

  • MD5

    3bd2860ed63fe32da31ab9c3a8c3498c

  • SHA1

    5cfdb07bd9820ebc9731e348133774b311405509

  • SHA256

    ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7

  • SHA512

    9a9ea261733566d6ac9c498878e3ab192fb8382bf5b4129dc5e116578eb3177fe0a2944d0511db57fa02ffb24ff576e5defbdd80a43ff68d46c88ef72d323f62

Malware Config

Extracted

Family

djvu

C2

http://tzgl.org/lancer/get.php

Attributes
  • extension

    .yqal

  • offline_id

    K3PMMX2aWwpnYby88Dzg7tmaIW7Tv0HMWvSyr7t1

  • payload_url

    http://kotob.top/dl/build2.exe

    http://tzgl.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-rIyEiK9ekc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0356gSd743d

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe
    "C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe
      "C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\2395cfe4-5a5c-4aa5-875c-4e763006f6f0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1788
      • C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe
        "C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe
          "C:\Users\Admin\AppData\Local\Temp\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2236

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    6a4823dd14ee6616a4ef99d2bea9a44c

    SHA1

    1b0952c188fce7f3a0014cb473a80a66f3c71337

    SHA256

    cef0b13034255ff54ac6ee3a35c93cd92fe3d80e5793c2b5e63c0a42fcc3ff98

    SHA512

    a41d2a3f5c827518c102487af315e1303a50578eb258f65c17591eba0bc027ee2aa0a4941c494b9b5eb89842382f60ab3fec66e15a3f77cbf03cbae6dd9974c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    efd1d8e8293f5bd8d688fef877221ccb

    SHA1

    55fd26b5c3ad5242aa08d1910c2e085d30489549

    SHA256

    43be67b3e85dd203dfabd04252b7b5a261b21ec846e11d760a4f07e70bf528c1

    SHA512

    755e7c67c4a0bc84debd21727d38dca438e7ea3ac8dc98b5f4140ae3f5de32c34aacd63c7cbfb110e1a2d3859089317a4401e07b7db5c36d2d167d9b764ec2cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    1c01a480e00e852229e5af52f86d4234

    SHA1

    4aae64a80d2e317047b5ec54203a8fc9a4a0923b

    SHA256

    7d4d990d2a38a1a789d708482c3c752e7a0498511ee4bcd661ca19f7f7ac6845

    SHA512

    0016444a7461526c35cf74243f54f888c95039710931a30a9e294687d0e97f2dbe30ea6069d2ed58f49129f9b1db6d3f7dbb1b3320d0602a993fee1051533b47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    b6cff28ad8e00936eec9a1495d853129

    SHA1

    f77c1d3bd260fd51af39c4ce7e0fda4f1047c4f0

    SHA256

    e4e81bcd4a5e89c57408c03dc664183a21679098b4d97f77f47275f314c18fee

    SHA512

    1439f93832fdc382741b09923103995b751653ca14bd66779b0da9bd995f1c390356b331da7ba35cd4b9e3cffa48cba9d26908ed33eb0343465aff6f2234c6bd

  • C:\Users\Admin\AppData\Local\2395cfe4-5a5c-4aa5-875c-4e763006f6f0\ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7.exe
    MD5

    3bd2860ed63fe32da31ab9c3a8c3498c

    SHA1

    5cfdb07bd9820ebc9731e348133774b311405509

    SHA256

    ee7232883f14ea8e02751218805d313b2f57e686f7abd5ea855f2b65cf5e6cf7

    SHA512

    9a9ea261733566d6ac9c498878e3ab192fb8382bf5b4129dc5e116578eb3177fe0a2944d0511db57fa02ffb24ff576e5defbdd80a43ff68d46c88ef72d323f62

  • memory/624-123-0x0000000002126000-0x00000000021B8000-memory.dmp
    Filesize

    584KB

  • memory/624-122-0x0000000000000000-mapping.dmp
  • memory/1788-120-0x0000000000000000-mapping.dmp
  • memory/2236-125-0x0000000000424141-mapping.dmp
  • memory/2236-126-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2644-119-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2644-118-0x0000000000424141-mapping.dmp
  • memory/2644-117-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/3288-115-0x000000000066B000-0x00000000006FD000-memory.dmp
    Filesize

    584KB

  • memory/3288-116-0x00000000022C0000-0x00000000023DB000-memory.dmp
    Filesize

    1.1MB