Analysis

  • max time kernel
    56s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    03-02-2022 02:22

General

  • Target

    a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe

  • Size

    826KB

  • MD5

    8c76817c2fe3ed4843cac361f6fd8d86

  • SHA1

    f4124c09fa270df48e896072f53409fe59948291

  • SHA256

    a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416

  • SHA512

    8d179df5feebe0d4cb2c971ff25dc7b9b4680cb79f48e7f19eb2df74889a807a0cd7ab40b1bddaac0fa7193d0656a3c48e78706fb62b33c27772c726d557d3ac

Malware Config

Extracted

Family

djvu

C2

http://fuyt.org/test1/get.php

Attributes
  • extension

    .bbbw

  • offline_id

    jYeuANkMCJOEtaXsN8JcBUuEjwSP20EGT4t2Nct1

  • payload_url

    http://lencu.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-qqj8MrDVtG Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@sysmail.ch Reserve e-mail address to contact us: helprestoremanager@airmail.cc Your personal ID: 0382UIhfSd

rsa_pubkey.plain

Extracted

Family

vidar

Version

49.8

Botnet

517

C2

https://c.im/@prophef3

https://qoto.org/@prophef41

Attributes
  • profile_id

    517

Signatures

  • Detected Djvu ransomware 4 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe
    "C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe
      "C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\58dea988-fdb1-41d5-a358-0ef419fa6b24" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2448
      • C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe
        "C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe
          "C:\Users\Admin\AppData\Local\Temp\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3844
          • C:\Users\Admin\AppData\Local\3b1228ae-b7ff-4e4d-9138-7937fbc3f0b5\build2.exe
            "C:\Users\Admin\AppData\Local\3b1228ae-b7ff-4e4d-9138-7937fbc3f0b5\build2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:1136
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1452
              6⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:660

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    33d1c53ba363f4e01e8a56e97a76aac1

    SHA1

    36b1eedb6d1e2d2898043c05f650957af0f283c9

    SHA256

    df3dd95a78c64e43870744ef82a86970015a666c69babd1671d26a9bfc8d7377

    SHA512

    786bd8f6d1b42b568261bf12a305f98a49258335d1308a1df2776ef0adbb4ce71c8c13d89105a72f098eadd52921b9784ec69b0485af21ec4c30c16e311a04a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    785fba5418a4df5e682d7a4da4ef7103

    SHA1

    3afe4a04cd5a58d6b51221f5a3aa2b6ee6112d33

    SHA256

    87f5330cc843ef52a6175dbe88046fbe75f140800a1c934b676d05b9fef2fe66

    SHA512

    b712943187ee2a64371be31cef6fb4d39ace66d1c308a5f3ec73cfcd684ac78d9cd9a57e0d4294f88c51c9a32c9c23955b75d4939085b2f57939befa86e1ad96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    1e044cac67a8b3a64473c98d8b8b1aa8

    SHA1

    1954020874f2eed8b2479d69cc55c8eb2b38e418

    SHA256

    5c13ff2c69fa4e164c38537ceeef234c67e89082601058f8b82049fc284c9f8e

    SHA512

    d5f643d4501930705226a0a6a7b1fd83f299d24453a1f07595389e7abb8fc39f40af2f2a1f580df1672cec3a50077e613b86aacac227b76005fa50c139142fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    68591c3f1248e49e3db6ed7ad528de10

    SHA1

    5b465115e56aaed270d4fa72df112a1beef4756c

    SHA256

    55dc32f0dc2b5bfb3b77ab94b861fe3311a59c7123b17ccb9b530559b93ff7d4

    SHA512

    90af153afe780ae1723b10af02b1db6c1a1cf18e8bb7d83f2176f8ecb62cb7ec01643d0e5987b9445cdc1c15fd183978f7d3a34963f2e4fe9211558ef2caef8d

  • C:\Users\Admin\AppData\Local\3b1228ae-b7ff-4e4d-9138-7937fbc3f0b5\build2.exe
    MD5

    a96bef4d3678039d2325d8eb11a28064

    SHA1

    584b93829a5d0b7f8be36aadc4b4254d5905f71b

    SHA256

    2a16d83ed34f45fe29d37579d4b45385a4c92900ad1ed71473449af3a9062e96

    SHA512

    d7af7152b37524fc93f40cb3884adec1a683c84c141dda4d3eac4333e2a6c7ceb029b6b17e1d90c3f836a634bf7af7f3cf6963ae97a94265df936f9fcf812cce

  • C:\Users\Admin\AppData\Local\3b1228ae-b7ff-4e4d-9138-7937fbc3f0b5\build2.exe
    MD5

    a96bef4d3678039d2325d8eb11a28064

    SHA1

    584b93829a5d0b7f8be36aadc4b4254d5905f71b

    SHA256

    2a16d83ed34f45fe29d37579d4b45385a4c92900ad1ed71473449af3a9062e96

    SHA512

    d7af7152b37524fc93f40cb3884adec1a683c84c141dda4d3eac4333e2a6c7ceb029b6b17e1d90c3f836a634bf7af7f3cf6963ae97a94265df936f9fcf812cce

  • C:\Users\Admin\AppData\Local\58dea988-fdb1-41d5-a358-0ef419fa6b24\a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416.exe
    MD5

    8c76817c2fe3ed4843cac361f6fd8d86

    SHA1

    f4124c09fa270df48e896072f53409fe59948291

    SHA256

    a1580ba70a95b1f326c3d3b23df6227e14aeb96178ab013a68b9c256ec68c416

    SHA512

    8d179df5feebe0d4cb2c971ff25dc7b9b4680cb79f48e7f19eb2df74889a807a0cd7ab40b1bddaac0fa7193d0656a3c48e78706fb62b33c27772c726d557d3ac

  • \ProgramData\mozglue.dll
    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \ProgramData\nss3.dll
    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • memory/660-117-0x0000000002430000-0x000000000254B000-memory.dmp
    Filesize

    1.1MB

  • memory/1136-229-0x0000000074070000-0x0000000074161000-memory.dmp
    Filesize

    964KB

  • memory/1136-223-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/1136-222-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/1136-224-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/1136-225-0x0000000002310000-0x0000000002355000-memory.dmp
    Filesize

    276KB

  • memory/1136-226-0x00000000001E0000-0x00000000001E2000-memory.dmp
    Filesize

    8KB

  • memory/1136-227-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/1136-228-0x00000000759E0000-0x0000000075BA2000-memory.dmp
    Filesize

    1.8MB

  • memory/1136-232-0x00000000725E0000-0x0000000072604000-memory.dmp
    Filesize

    144KB

  • memory/1136-233-0x0000000072610000-0x0000000072744000-memory.dmp
    Filesize

    1.2MB

  • memory/3616-116-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/3616-118-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/3844-219-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB