Analysis

  • max time kernel
    177s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    10-05-2022 05:39

General

  • Target

    buildp.exe

  • Size

    841KB

  • MD5

    efed57771cb41fdde63781d1e195912c

  • SHA1

    a71b0545951c99eb6ad4a50c22d02c958003d920

  • SHA256

    72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

  • SHA512

    6fd84f80ba5f3c53f48a6a0135cedc7b489cca419742e043116468bcda0898398dd7ddff4ac7d0d8b283312d4c411790b8ff74276f14016021597498b306a080

Malware Config

Extracted

Family

djvu

C2

http://fuyt.org/lancer/get.php

Attributes
  • extension

    .gtys

  • offline_id

    qwVQoIsE2xLety0oNWloOilSDuIBXJGK86LM3ot1

  • payload_url

    http://zerit.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-fnn5kv33Vv Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0439JIjdm

rsa_pubkey.plain

Extracted

Family

vidar

Version

52

Botnet

517

C2

https://t.me/hollandracing

https://busshi.moe/@ronxik321

Attributes
  • profile_id

    517

Signatures

  • Detected Djvu ransomware 8 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

    suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

  • Vidar Stealer 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\buildp.exe
    "C:\Users\Admin\AppData\Local\Temp\buildp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\buildp.exe
      "C:\Users\Admin\AppData\Local\Temp\buildp.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\4b0534b1-0c4e-486c-a7ff-0d9934def8e9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\buildp.exe
        "C:\Users\Admin\AppData\Local\Temp\buildp.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Users\Admin\AppData\Local\Temp\buildp.exe
          "C:\Users\Admin\AppData\Local\Temp\buildp.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe
            "C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe
              "C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    b9f21d8db36e88831e5352bb82c438b3

    SHA1

    4a3c330954f9f65a2f5fd7e55800e46ce228a3e2

    SHA256

    998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e

    SHA512

    d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    110eefc19acb9f828397632b872abfb8

    SHA1

    ad7a448c535282ca57e73188c0b6b534998a51bf

    SHA256

    2fc13fe7c1ef84648ecb417a463167c792e7b85d5d84e630b2e391ea72ea074b

    SHA512

    713ba00c89c929e28f8e07463ed506ddafcf30ed6bc90e09ccd0bbeaf145a6c49a8a28ce454ad4f617d65c851f1bff6df72bf9bc2173da7219cfaec44d5aa23e

  • C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe

    Filesize

    380KB

    MD5

    ba5461bef761e4e723c2567cfe710fe3

    SHA1

    92f94d48482ca2006caf4c50ac387d1b532e837b

    SHA256

    c9c82de52be77596153f54b192da4e91e671cc5ad01d6bfe0011fd8e9d5723fa

    SHA512

    24f0e12607ff0672c236e92193b659c5121059b5ae56545790830081835120aca464e003066455227d31ee8445787fdfbf90a8be29af9e837edbe7e808e11149

  • C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe

    Filesize

    380KB

    MD5

    ba5461bef761e4e723c2567cfe710fe3

    SHA1

    92f94d48482ca2006caf4c50ac387d1b532e837b

    SHA256

    c9c82de52be77596153f54b192da4e91e671cc5ad01d6bfe0011fd8e9d5723fa

    SHA512

    24f0e12607ff0672c236e92193b659c5121059b5ae56545790830081835120aca464e003066455227d31ee8445787fdfbf90a8be29af9e837edbe7e808e11149

  • C:\Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe

    Filesize

    380KB

    MD5

    ba5461bef761e4e723c2567cfe710fe3

    SHA1

    92f94d48482ca2006caf4c50ac387d1b532e837b

    SHA256

    c9c82de52be77596153f54b192da4e91e671cc5ad01d6bfe0011fd8e9d5723fa

    SHA512

    24f0e12607ff0672c236e92193b659c5121059b5ae56545790830081835120aca464e003066455227d31ee8445787fdfbf90a8be29af9e837edbe7e808e11149

  • C:\Users\Admin\AppData\Local\4b0534b1-0c4e-486c-a7ff-0d9934def8e9\buildp.exe

    Filesize

    841KB

    MD5

    efed57771cb41fdde63781d1e195912c

    SHA1

    a71b0545951c99eb6ad4a50c22d02c958003d920

    SHA256

    72cd1426f13a698c7d63a288f4920147812303e8f10a4e66e414cc7c2206381d

    SHA512

    6fd84f80ba5f3c53f48a6a0135cedc7b489cca419742e043116468bcda0898398dd7ddff4ac7d0d8b283312d4c411790b8ff74276f14016021597498b306a080

  • \Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe

    Filesize

    380KB

    MD5

    ba5461bef761e4e723c2567cfe710fe3

    SHA1

    92f94d48482ca2006caf4c50ac387d1b532e837b

    SHA256

    c9c82de52be77596153f54b192da4e91e671cc5ad01d6bfe0011fd8e9d5723fa

    SHA512

    24f0e12607ff0672c236e92193b659c5121059b5ae56545790830081835120aca464e003066455227d31ee8445787fdfbf90a8be29af9e837edbe7e808e11149

  • \Users\Admin\AppData\Local\120d51e8-8232-4223-8080-77e1ca3cf793\build2.exe

    Filesize

    380KB

    MD5

    ba5461bef761e4e723c2567cfe710fe3

    SHA1

    92f94d48482ca2006caf4c50ac387d1b532e837b

    SHA256

    c9c82de52be77596153f54b192da4e91e671cc5ad01d6bfe0011fd8e9d5723fa

    SHA512

    24f0e12607ff0672c236e92193b659c5121059b5ae56545790830081835120aca464e003066455227d31ee8445787fdfbf90a8be29af9e837edbe7e808e11149

  • memory/876-70-0x0000000000520000-0x00000000005B1000-memory.dmp

    Filesize

    580KB

  • memory/876-66-0x0000000000520000-0x00000000005B1000-memory.dmp

    Filesize

    580KB

  • memory/912-61-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/912-62-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/912-60-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/912-55-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/916-59-0x0000000001E90000-0x0000000001FAB000-memory.dmp

    Filesize

    1.1MB

  • memory/916-54-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/916-57-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/1064-72-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1064-73-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1716-79-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1716-86-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1716-87-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2040-82-0x000000000063B000-0x0000000000666000-memory.dmp

    Filesize

    172KB

  • memory/2040-84-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB