Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-05-2022 01:51

General

  • Target

    f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe

  • Size

    745KB

  • MD5

    ea5f9e5a6230afdf746ca66d73a562fe

  • SHA1

    e87f7c58123d206c0b2d6bbff53a776672337624

  • SHA256

    f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2

  • SHA512

    f24dc06251bf035973737fee95bedb976ce0eaa0e671a02e364de5d5ea6584b00685aef1466dd1baebc4a74823ae69dc58f01a42a3b5015a02eab8066d61ccdc

Malware Config

Extracted

Family

djvu

C2

http://cjto.top/nddddhsspen6/get.php

Attributes
  • extension

    .ogdo

  • offline_id

    XIyyRCNH8lJ6pGHLNnQPCMfabY9p3AQCEQc3Lnt1

  • payload_url

    http://cjto.top/files/penelop/updatewin1.exe

    http://cjto.top/files/penelop/updatewin2.exe

    http://cjto.top/files/penelop/updatewin.exe

    http://cjto.top/files/penelop/3.exe

    http://cjto.top/files/penelop/4.exe

    http://cjto.top/files/penelop/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-SY0GqQtRAT Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0250riuyfgh

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 4 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • suricata: ET MALWARE APT-C-23 Activity (GET)

    suricata: ET MALWARE APT-C-23 Activity (GET)

  • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

  • suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key

    suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key

  • suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

    suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe
    "C:\Users\Admin\AppData\Local\Temp\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\c9995d8f-d4ca-46ea-95e8-06630a4015d3" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:4324
    • C:\Users\Admin\AppData\Local\Temp\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe
      "C:\Users\Admin\AppData\Local\Temp\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 2256
      2⤵
      • Program crash
      PID:1200
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2540 -ip 2540
    1⤵
      PID:1500
    • C:\Users\Admin\AppData\Local\c9995d8f-d4ca-46ea-95e8-06630a4015d3\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe
      C:\Users\Admin\AppData\Local\c9995d8f-d4ca-46ea-95e8-06630a4015d3\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe --Task
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 1632
        2⤵
        • Program crash
        PID:4324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3144 -ip 3144
      1⤵
        PID:2536

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        727B

        MD5

        8ae6f45bb6c9f288a96a3402dc17e2d9

        SHA1

        9ddb0d782cb4728675a1f5b61cfc632997349cdf

        SHA256

        ae4681e5db7de9744bdd78a943d6be6a390aa925125935d6cb691a27c8b2ebd3

        SHA512

        ee94f18f21437c1fba42cca69d535997c89438801ea6e823e99d384e9bc0239b041dc5ed854063a571bac2bbd2f83d7113c7f456d130b15e7db847e7fe4e8ec7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9

        Filesize

        506B

        MD5

        77658ff40aeafeb456f73900ec6deaff

        SHA1

        19cf09afd53339e1e1ca9a8abd86b29446d16720

        SHA256

        41e750255bfb1d351cdaa00af9e43093eb800ac12cc2fda278ebf63212967dda

        SHA512

        337d550df86721081fc090d08c9d1ca58c00c6fc27dca14058a0d71a10e0babf9dd0f8dde3c0ca101ed9929ba1c42f3f6ca06ba4e8ec3f629a978a457716f113

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        402B

        MD5

        bed3ca173b41e7218d81942cc855aad5

        SHA1

        06c66780dd5e28a77b4efb2d56d4fba37fc13f4f

        SHA256

        7ebc799e3414a546366c20380ea7244a82a07adf967d41f5390f4a16555087a5

        SHA512

        c3278ed4534cff9da76364c8bd8a3426355efbcf577af17e00b1e2d3347ad011eb51f4ea99e0819713492c9f674fd7f2b9eb63aae48e6ab6aac46a3f7f56659a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9

        Filesize

        248B

        MD5

        baca092dcd009e4f054262f6ef82c606

        SHA1

        8d0231d445e1e7c6fc2301e11b9b769fb25dff7f

        SHA256

        e2f8782c5e62f3c12ba0ffe2f787a1e411ddf109780c037e555aaf5c726874c3

        SHA512

        6a243ac3334b586194c9bc7670739eae1d88ce95658c6292c619405e4dccc7fd95a01cd2b25686144b16a951b0c402a6f777a986de78388401b19d337ac0b699

      • C:\Users\Admin\AppData\Local\c9995d8f-d4ca-46ea-95e8-06630a4015d3\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe

        Filesize

        745KB

        MD5

        ea5f9e5a6230afdf746ca66d73a562fe

        SHA1

        e87f7c58123d206c0b2d6bbff53a776672337624

        SHA256

        f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2

        SHA512

        f24dc06251bf035973737fee95bedb976ce0eaa0e671a02e364de5d5ea6584b00685aef1466dd1baebc4a74823ae69dc58f01a42a3b5015a02eab8066d61ccdc

      • C:\Users\Admin\AppData\Local\c9995d8f-d4ca-46ea-95e8-06630a4015d3\f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2.exe

        Filesize

        745KB

        MD5

        ea5f9e5a6230afdf746ca66d73a562fe

        SHA1

        e87f7c58123d206c0b2d6bbff53a776672337624

        SHA256

        f7416e3f009957168dba525532072bcdb53ef2e20e8f6891ac5ad5a16b5f16c2

        SHA512

        f24dc06251bf035973737fee95bedb976ce0eaa0e671a02e364de5d5ea6584b00685aef1466dd1baebc4a74823ae69dc58f01a42a3b5015a02eab8066d61ccdc

      • memory/2540-132-0x0000000000400000-0x0000000000A0A000-memory.dmp

        Filesize

        6.0MB

      • memory/2540-131-0x0000000000DA0000-0x0000000000EBA000-memory.dmp

        Filesize

        1.1MB

      • memory/2540-130-0x0000000000AE6000-0x0000000000B77000-memory.dmp

        Filesize

        580KB

      • memory/3144-143-0x0000000000C16000-0x0000000000CA7000-memory.dmp

        Filesize

        580KB

      • memory/3144-144-0x0000000000400000-0x0000000000A0A000-memory.dmp

        Filesize

        6.0MB

      • memory/4076-135-0x0000000000000000-mapping.dmp

      • memory/4076-140-0x0000000000C82000-0x0000000000D13000-memory.dmp

        Filesize

        580KB

      • memory/4076-141-0x0000000000400000-0x0000000000A0A000-memory.dmp

        Filesize

        6.0MB

      • memory/4324-133-0x0000000000000000-mapping.dmp