Analysis

  • max time kernel
    157s
  • max time network
    176s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    03-02-2022 17:06

General

  • Target

    007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe

  • Size

    828KB

  • MD5

    9501470fe5ea3232193373b54c6d8987

  • SHA1

    f5eaf1fc0691910e9b35d080219f226e8935eb72

  • SHA256

    007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00

  • SHA512

    869946fa03e34de6a51239dd10d8bef9a24adce20807918fb71fdf676cd0dd4dab6fb710c02f20cebdac4e9d2008b53608fbc9379b02b1f62cf0e269782d4e88

Malware Config

Extracted

Family

djvu

C2

http://fuyt.org/test1/get.php

Attributes
  • extension

    .bbbw

  • offline_id

    jYeuANkMCJOEtaXsN8JcBUuEjwSP20EGT4t2Nct1

  • payload_url

    http://lencu.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-qqj8MrDVtG Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0382UIhfSd

rsa_pubkey.plain

Extracted

Family

vidar

Version

49.8

Botnet

517

C2

https://c.im/@prophef3

https://qoto.org/@prophef41

Attributes
  • profile_id

    517

Signatures

  • Detected Djvu ransomware 4 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe
    "C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe
      "C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\990e3ece-a982-4807-9edf-c2774dfa40c5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2780
      • C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe
        "C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe
          "C:\Users\Admin\AppData\Local\Temp\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Users\Admin\AppData\Local\28bf96a8-8143-41c9-93a8-4a93fba3c118\build2.exe
            "C:\Users\Admin\AppData\Local\28bf96a8-8143-41c9-93a8-4a93fba3c118\build2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 1468
              6⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    33d1c53ba363f4e01e8a56e97a76aac1

    SHA1

    36b1eedb6d1e2d2898043c05f650957af0f283c9

    SHA256

    df3dd95a78c64e43870744ef82a86970015a666c69babd1671d26a9bfc8d7377

    SHA512

    786bd8f6d1b42b568261bf12a305f98a49258335d1308a1df2776ef0adbb4ce71c8c13d89105a72f098eadd52921b9784ec69b0485af21ec4c30c16e311a04a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    785fba5418a4df5e682d7a4da4ef7103

    SHA1

    3afe4a04cd5a58d6b51221f5a3aa2b6ee6112d33

    SHA256

    87f5330cc843ef52a6175dbe88046fbe75f140800a1c934b676d05b9fef2fe66

    SHA512

    b712943187ee2a64371be31cef6fb4d39ace66d1c308a5f3ec73cfcd684ac78d9cd9a57e0d4294f88c51c9a32c9c23955b75d4939085b2f57939befa86e1ad96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    MD5

    0613d7807deaf2ddb01357660b794228

    SHA1

    634c5569d5a72a81592e009b24754c2874a5017e

    SHA256

    fc3d44458b53e02aabc196832311c36048242ec594e8b1c89d45d22e9943cf3e

    SHA512

    812910fd4e8f687dffd1f6023410ef53bd50a0b183d80f09886bfa4e21023ebdc001cb9995400031daa49d07a169a24c366a91f365b2b70487545fb901329c6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    MD5

    0536f09e36923bb6a6c081e28220394d

    SHA1

    75e4c2bbed6d45079bc2ac30c21c7f118d64feb7

    SHA256

    897d213db662ccfb7d5c8f9a1cec37053b8fd8915756c3bf48f6efe22b91fd92

    SHA512

    fd014c4d5cd9e1eef393a03d890c3de972c2687f3fc7ee1652538fd354216ec7473b98042131e06b5e95d227af69c25773b54945670c7fae1b25680a6e31137f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    MD5

    33aca28f29a9d0c74f7743c46f896452

    SHA1

    f411a7602a856635e26504718009e1718c486156

    SHA256

    9df52b66f98b228d7f165cef3f0c8d5ef496a7602ce1d05f204ab6b0e2d01229

    SHA512

    3dde89c1b3bf53380bb8349eb42ea86af38b9f8c1e474964a5c58ceb0da30cdcc9a7d3d8f40c58d0f611bfecbc8d0524dc129c082394a9015faf081426444a1b

  • C:\Users\Admin\AppData\Local\28bf96a8-8143-41c9-93a8-4a93fba3c118\build2.exe

    MD5

    a96bef4d3678039d2325d8eb11a28064

    SHA1

    584b93829a5d0b7f8be36aadc4b4254d5905f71b

    SHA256

    2a16d83ed34f45fe29d37579d4b45385a4c92900ad1ed71473449af3a9062e96

    SHA512

    d7af7152b37524fc93f40cb3884adec1a683c84c141dda4d3eac4333e2a6c7ceb029b6b17e1d90c3f836a634bf7af7f3cf6963ae97a94265df936f9fcf812cce

  • C:\Users\Admin\AppData\Local\28bf96a8-8143-41c9-93a8-4a93fba3c118\build2.exe

    MD5

    a96bef4d3678039d2325d8eb11a28064

    SHA1

    584b93829a5d0b7f8be36aadc4b4254d5905f71b

    SHA256

    2a16d83ed34f45fe29d37579d4b45385a4c92900ad1ed71473449af3a9062e96

    SHA512

    d7af7152b37524fc93f40cb3884adec1a683c84c141dda4d3eac4333e2a6c7ceb029b6b17e1d90c3f836a634bf7af7f3cf6963ae97a94265df936f9fcf812cce

  • C:\Users\Admin\AppData\Local\990e3ece-a982-4807-9edf-c2774dfa40c5\007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00.exe

    MD5

    9501470fe5ea3232193373b54c6d8987

    SHA1

    f5eaf1fc0691910e9b35d080219f226e8935eb72

    SHA256

    007ae7550fcc0e7368a9ebd1dcc6066145f256af24847075cde83233ced10d00

    SHA512

    869946fa03e34de6a51239dd10d8bef9a24adce20807918fb71fdf676cd0dd4dab6fb710c02f20cebdac4e9d2008b53608fbc9379b02b1f62cf0e269782d4e88

  • \ProgramData\mozglue.dll

    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \ProgramData\nss3.dll

    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • memory/1972-116-0x00000000023A0000-0x00000000024BB000-memory.dmp

    Filesize

    1.1MB

  • memory/2112-118-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2112-117-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2880-128-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2904-134-0x0000000002320000-0x0000000002365000-memory.dmp

    Filesize

    276KB

  • memory/2904-133-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-135-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB

  • memory/2904-136-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-137-0x00000000745B0000-0x0000000074772000-memory.dmp

    Filesize

    1.8MB

  • memory/2904-138-0x00000000777C0000-0x00000000778B1000-memory.dmp

    Filesize

    964KB

  • memory/2904-132-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-131-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-141-0x0000000072A90000-0x0000000072AB4000-memory.dmp

    Filesize

    144KB

  • memory/2904-142-0x0000000072AF0000-0x0000000072C24000-memory.dmp

    Filesize

    1.2MB