Analysis

  • max time kernel
    172s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-05-2022 21:04

General

  • Target

    08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe

  • Size

    755KB

  • MD5

    959b266cad13ba35aee35d8d4b723ed4

  • SHA1

    026d092515263021e450372713937d0c4f352e2f

  • SHA256

    08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3

  • SHA512

    d261068c3e26d8471a187b2c9e00dc2d447a0d7d70e917cd6dbaeaac668f05e6246a2da85ff2bd69e39ccf07d7e66abde118201cb27ce3f037dc0b74c00d4383

Malware Config

Extracted

Family

djvu

C2

http://ring1.ug/As73yhsyU34578hxxx/SDf565g/get.php

Attributes
  • extension

    .coot

  • offline_id

    MRQ5kb5Z12tWuP3e25YoRt4PRDrJd2yuI3coott1

  • payload_url

    http://ring1.ug/files/cost/updatewin1.exe

    http://ring1.ug/files/cost/updatewin2.exe

    http://ring1.ug/files/cost/updatewin.exe

    http://ring1.ug/files/cost/3.exe

    http://ring1.ug/files/cost/4.exe

    http://ring1.ug/files/cost/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-IbdGyCKhdr Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: salesrestoresoftware@firemail.cc Reserve e-mail address to contact us: salesrestoresoftware@gmail.com Your personal ID: 0175Asd374y5iuhld

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 7 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe
    "C:\Users\Admin\AppData\Local\Temp\08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\4d818e59-2f86-4a14-99d7-74390a1d9e9e" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1552
    • C:\Users\Admin\AppData\Local\Temp\08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe
      "C:\Users\Admin\AppData\Local\Temp\08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 2148
      2⤵
      • Program crash
      PID:1388
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4884 -ip 4884
    1⤵
      PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    File Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
      Filesize

      727B

      MD5

      78077c9c0f44735ebc285343f6cddb03

      SHA1

      f16447f2ade323433685e824ee10fe6f251497cc

      SHA256

      cb322181548b26c639ccae02c2e6c35b82943e6f0655f2726a1415c688f030b1

      SHA512

      707b3ea73dfa939ce4e1b8c94c77b03a94541b228a28c36df953b6e495df940b346c350959747363a1a32760f0c53180e0e90f628c4f4bf09e53c19ba8e35460

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      Filesize

      471B

      MD5

      c68c131be481d00a6e7680b8abede43c

      SHA1

      6fe949c56d2746a93915c862cc84d526d004bf7f

      SHA256

      5ca8816929c5b74f39fa15656ca061f31bef42eb5bc9964bf7ccbbf441a34e5f

      SHA512

      f9d8ee9d070f352e4d9e32a161353546459dfa3836676eca21f5894db009a05b467e461280c7120464c721c821c4675ed9f41427bfe83d4f0f4d85bb172c55ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
      Filesize

      402B

      MD5

      5793e3daddf4809ecd13fcf75969b19e

      SHA1

      c1f4fdc8eedff95791d2af659869877c66ec4b10

      SHA256

      4fcc2e424a554f07d89c5325f8a0b797f940ed187de1717a6ae997069720eb84

      SHA512

      a59f178010727340bfd8e052d6cea8b8ef35e2debe307f61317bc0a6c1cef70dd52c6f00babf0bef7e2dd0b3e86f56a62e90d86c3dc32baaafa871c100596f6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      Filesize

      396B

      MD5

      13fa81603ae53a86d7bb973880027c7c

      SHA1

      e3a8c2adb56b0b47b3e84d863e8e54bdb78d5cba

      SHA256

      b47d803fd3c5f3cdfdc01cf91914f5c4a0434cbd1840c808b7b7d0b029e8d1bf

      SHA512

      a977e55f55502adf31bf15af5e1f0cae3607b595c16b731303db6d2cd640d21c0aaa88f193eac2bd3a001dec3768cd9294256b3d8c6543112696f131037ee9e7

    • C:\Users\Admin\AppData\Local\4d818e59-2f86-4a14-99d7-74390a1d9e9e\08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3.exe
      Filesize

      755KB

      MD5

      959b266cad13ba35aee35d8d4b723ed4

      SHA1

      026d092515263021e450372713937d0c4f352e2f

      SHA256

      08b6c38e79c9ac0ce7a7fafaaae1334c41d70b860ff2c8eb6b2742c58cdb06b3

      SHA512

      d261068c3e26d8471a187b2c9e00dc2d447a0d7d70e917cd6dbaeaac668f05e6246a2da85ff2bd69e39ccf07d7e66abde118201cb27ce3f037dc0b74c00d4383

    • memory/1552-133-0x0000000000000000-mapping.dmp
    • memory/4048-137-0x0000000000000000-mapping.dmp
    • memory/4048-138-0x0000000005D4B000-0x0000000005DDC000-memory.dmp
      Filesize

      580KB

    • memory/4048-143-0x0000000000400000-0x00000000058A5000-memory.dmp
      Filesize

      84.6MB

    • memory/4048-144-0x0000000000400000-0x00000000058A5000-memory.dmp
      Filesize

      84.6MB

    • memory/4884-135-0x0000000005F00000-0x000000000601A000-memory.dmp
      Filesize

      1.1MB

    • memory/4884-136-0x0000000000400000-0x00000000058A5000-memory.dmp
      Filesize

      84.6MB

    • memory/4884-130-0x0000000005DFF000-0x0000000005E90000-memory.dmp
      Filesize

      580KB

    • memory/4884-132-0x0000000000400000-0x00000000058A5000-memory.dmp
      Filesize

      84.6MB

    • memory/4884-131-0x0000000005F00000-0x000000000601A000-memory.dmp
      Filesize

      1.1MB

    • memory/4884-145-0x0000000000400000-0x00000000058A5000-memory.dmp
      Filesize

      84.6MB