Analysis
-
max time kernel
102s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe
Resource
win10v2004-20220414-en
General
-
Target
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe
-
Size
1.2MB
-
MD5
c25ef68e3f182a258cc00ccc01c985e2
-
SHA1
498e57ef53f9a5deec7a08edfe8dd881e70a68d2
-
SHA256
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7
-
SHA512
b00c9899a1f0677b7ddeb10472505e4e16b9082c442d00b24e826615211eb77b612656cd246219f336f86b3da19b25259a1056b819ac0743adf6d517cbcabf78
Malware Config
Extracted
djvu
http://ring1.ug/As73yhsyU34578hxxx/SDf565g/get.php
-
extension
.coot
-
offline_id
MRQ5kb5Z12tWuP3e25YoRt4PRDrJd2yuI3coott1
-
payload_url
http://ring1.ug/files/cost/updatewin1.exe
http://ring1.ug/files/cost/updatewin2.exe
http://ring1.ug/files/cost/updatewin.exe
http://ring1.ug/files/cost/3.exe
http://ring1.ug/files/cost/4.exe
http://ring1.ug/files/cost/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-IbdGyCKhdr Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: salesrestoresoftware@firemail.cc Reserve e-mail address to contact us: salesrestoresoftware@gmail.com Your personal ID: 0175Asd374y5iuhld
Signatures
-
Detected Djvu ransomware 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1868-57-0x00000000094A0000-0x00000000095BA000-memory.dmp family_djvu behavioral1/memory/1868-58-0x0000000000400000-0x0000000001400000-memory.dmp family_djvu behavioral1/memory/1868-62-0x0000000000400000-0x0000000001400000-memory.dmp family_djvu behavioral1/memory/1008-66-0x0000000000400000-0x0000000001400000-memory.dmp family_djvu behavioral1/memory/1008-67-0x0000000000400000-0x0000000001400000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d0921009-720c-4a32-8d1a-00f1958576b8\\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe\" --AutoStart" 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.2ip.ua 7 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exepid process 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1008 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1008 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exedescription pid process target process PID 1868 wrote to memory of 688 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe icacls.exe PID 1868 wrote to memory of 688 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe icacls.exe PID 1868 wrote to memory of 688 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe icacls.exe PID 1868 wrote to memory of 688 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe icacls.exe PID 1868 wrote to memory of 1008 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe PID 1868 wrote to memory of 1008 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe PID 1868 wrote to memory of 1008 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe PID 1868 wrote to memory of 1008 1868 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe 1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe"C:\Users\Admin\AppData\Local\Temp\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d0921009-720c-4a32-8d1a-00f1958576b8" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe"C:\Users\Admin\AppData\Local\Temp\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\d0921009-720c-4a32-8d1a-00f1958576b8\1b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7.exeFilesize
1.2MB
MD5c25ef68e3f182a258cc00ccc01c985e2
SHA1498e57ef53f9a5deec7a08edfe8dd881e70a68d2
SHA2561b359f5e2446a66b1e44143fabdfe23de8c237e93eeae0e973646dd205a645a7
SHA512b00c9899a1f0677b7ddeb10472505e4e16b9082c442d00b24e826615211eb77b612656cd246219f336f86b3da19b25259a1056b819ac0743adf6d517cbcabf78
-
memory/688-59-0x0000000000000000-mapping.dmp
-
memory/1008-63-0x00000000093D0000-0x0000000009492000-memory.dmpFilesize
776KB
-
memory/1008-61-0x0000000000000000-mapping.dmp
-
memory/1008-65-0x00000000093D0000-0x0000000009461000-memory.dmpFilesize
580KB
-
memory/1008-66-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1008-67-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1868-57-0x00000000094A0000-0x00000000095BA000-memory.dmpFilesize
1.1MB
-
memory/1868-58-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1868-56-0x00000000093D0000-0x0000000009461000-memory.dmpFilesize
580KB
-
memory/1868-55-0x0000000075541000-0x0000000075543000-memory.dmpFilesize
8KB
-
memory/1868-62-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1868-54-0x00000000093D0000-0x0000000009492000-memory.dmpFilesize
776KB