Analysis

  • max time kernel
    190s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-05-2022 14:04

General

  • Target

    3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe

  • Size

    1.1MB

  • MD5

    bba54c282b52450d29c0372a0d0801ea

  • SHA1

    670981a5ef11461aa1891ab300c41f7e83c4e64d

  • SHA256

    3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9

  • SHA512

    056cba65bbaf1aaa7f9a3d548dd6b958e562cd4e3be5e91b1998c3d998f5197a241b7bf8da8470743962d902153b6cfbf2239e18b7bacdd6f30ecae248e71c5d

Malware Config

Extracted

Family

djvu

C2

http://ring1.ug/As73yhsyU34578hxxx/SDf565g/get.php

Attributes
  • extension

    .coot

  • offline_id

    MRQ5kb5Z12tWuP3e25YoRt4PRDrJd2yuI3coott1

  • payload_url

    http://ring1.ug/files/cost/updatewin1.exe

    http://ring1.ug/files/cost/updatewin2.exe

    http://ring1.ug/files/cost/updatewin.exe

    http://ring1.ug/files/cost/3.exe

    http://ring1.ug/files/cost/4.exe

    http://ring1.ug/files/cost/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-IbdGyCKhdr Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: salesrestoresoftware@firemail.cc Reserve e-mail address to contact us: salesrestoresoftware@gmail.com Your personal ID: 0175Asd374y5iuhld

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe
    "C:\Users\Admin\AppData\Local\Temp\3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\23efcecb-0d0e-483d-88bd-158adca16837" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:2940
    • C:\Users\Admin\AppData\Local\Temp\3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe
      "C:\Users\Admin\AppData\Local\Temp\3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:4432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 1688
      2⤵
      • Program crash
      PID:3444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1512 -ip 1512
    1⤵
      PID:4972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    File Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\23efcecb-0d0e-483d-88bd-158adca16837\3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe
      Filesize

      1.1MB

      MD5

      bba54c282b52450d29c0372a0d0801ea

      SHA1

      670981a5ef11461aa1891ab300c41f7e83c4e64d

      SHA256

      3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9

      SHA512

      056cba65bbaf1aaa7f9a3d548dd6b958e562cd4e3be5e91b1998c3d998f5197a241b7bf8da8470743962d902153b6cfbf2239e18b7bacdd6f30ecae248e71c5d

    • memory/1512-130-0x000000000999E000-0x0000000009A2F000-memory.dmp
      Filesize

      580KB

    • memory/1512-131-0x0000000009A70000-0x0000000009B8A000-memory.dmp
      Filesize

      1.1MB

    • memory/1512-132-0x0000000000400000-0x0000000001400000-memory.dmp
      Filesize

      16.0MB

    • memory/2940-133-0x0000000000000000-mapping.dmp
    • memory/4432-135-0x0000000000000000-mapping.dmp
    • memory/4432-136-0x0000000009834000-0x00000000098C5000-memory.dmp
      Filesize

      580KB

    • memory/4432-137-0x0000000000400000-0x0000000001400000-memory.dmp
      Filesize

      16.0MB