Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    07-12-2021 06:05

General

  • Target

    1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe

  • Size

    841KB

  • MD5

    bd2e92f812723f915ebe18bd706a782b

  • SHA1

    fa60fa5e462c24d2ba7e103a8fd0674393545e9d

  • SHA256

    1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813

  • SHA512

    a7c3624a9eed59f9ab6f4f8a7a93585eaca0072fe9b9eac41c88df05dc354810b7ddfbeb0199908c559cfadd1c2139fb54d544ce98d421dd2e11418d757d0f17

Malware Config

Extracted

Family

djvu

C2

http://tzgl.org/lancer/get.php

Attributes
  • extension

    .hgsh

  • offline_id

    gYuqQ5GsAaJom08TivUVhlPzZDKd916x4NcXrWt1

  • payload_url

    http://kotob.top/dl/build2.exe

    http://tzgl.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-m8LBBi8x8F Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0358Sigrj

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe
    "C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe
      "C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\029b2a65-e39c-4a0b-8409-f393e3ecca1e" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:424
      • C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe
        "C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe
          "C:\Users\Admin\AppData\Local\Temp\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    dfd1d8c11c8e104d9ca31b6b589fb717

    SHA1

    50e4a082219aa5c4e2376f1e9910a748287bef36

    SHA256

    7e5518f47ccc38390147991b40a3addde74cb52264f8808cf1088f5f711e2345

    SHA512

    31fea2c3cd0ad810a7a298251571ef14ac2445f8fe1fc5e806f26378a9397c47a04790b9a3c5a02af83c0e572878e7d6c59c7751a8be012902c1c86b699dd216

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    0ffb91dc0ac91e9630245216a5677aff

    SHA1

    d861ae5652a25d5f0396178818058150adf00273

    SHA256

    b88d9ca03ea0f1c5900d203f3e416f0fa159823801358261823b5898cd97fe6b

    SHA512

    063f2bce3ead49f7bd9a7c8aa21161f78a25362034c2973f4d4721001f475296b7aee221801b7dc28a342bb5f4688be58c999ff13e777a19d8eb8147a75bcbc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    b22da9a25d0e8632bfe2cf34705697fa

    SHA1

    f50957cb93ecaf25988008c3ba6bc1150561a9ac

    SHA256

    be136fee1e0fc2534147a7c2f6832e440e4a5829a0643feee0f150a7e9223eba

    SHA512

    00ea8c17e01979b718f9b9fa0c77eeb2d0aed7247f5db57b5031a3728f636e645596ec7f6699559a58370f98af51d2f66683e8d866bba0cfadd11148bd431dd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    16a4f9b777a35404ee22d8046f5e4ff1

    SHA1

    d54e5ba16222e56f050b3c530098fbfecf6fda4c

    SHA256

    525dab06cfebd63223d9363a4d739ba41c59bdbf382db7135f09035d5beef49b

    SHA512

    3acbbf761cc3f636f48c314c77ebf4bfac2c1cd78384591e802cb25bd0c5fb94aed41e347a79d3f467ef4dce8e51d825f2aa45161767f98f82bb53b8565928b3

  • C:\Users\Admin\AppData\Local\029b2a65-e39c-4a0b-8409-f393e3ecca1e\1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813.exe

    MD5

    bd2e92f812723f915ebe18bd706a782b

    SHA1

    fa60fa5e462c24d2ba7e103a8fd0674393545e9d

    SHA256

    1c9477d24296e2248a7f9e41bf65bdf472e608d3eb16cd7784e69c7c5592f813

    SHA512

    a7c3624a9eed59f9ab6f4f8a7a93585eaca0072fe9b9eac41c88df05dc354810b7ddfbeb0199908c559cfadd1c2139fb54d544ce98d421dd2e11418d757d0f17

  • memory/424-122-0x0000000000000000-mapping.dmp

  • memory/864-129-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/864-128-0x0000000000424141-mapping.dmp

  • memory/868-125-0x0000000000000000-mapping.dmp

  • memory/868-126-0x000000000071D000-0x00000000007AF000-memory.dmp

    Filesize

    584KB

  • memory/2600-124-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2600-119-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2600-120-0x0000000000424141-mapping.dmp

  • memory/3560-118-0x0000000000632000-0x00000000006C4000-memory.dmp

    Filesize

    584KB

  • memory/3560-121-0x0000000000730000-0x000000000084B000-memory.dmp

    Filesize

    1.1MB