Analysis

  • max time kernel
    153s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 03:56

General

  • Target

    7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe

  • Size

    740KB

  • MD5

    5aad3088c1ccdb8ce85b137074fa9bd6

  • SHA1

    b964df4fe2ae3ab72e54a8e5e362ea8d15305270

  • SHA256

    7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3

  • SHA512

    26f8cc1b776ccd43073f72f3cd1466744a4437d851234b950ecd84d3c48595584ccb2ccad2e6f086e652e1d54b4735465b70cbdd659a0ca48ae76008b25eb0b1

Malware Config

Extracted

Family

djvu

C2

http://ring1.ug/As73yhsyU34578hxxx/SDf565g/get.php

Attributes
  • extension

    .meka

  • offline_id

    iToA4bsB4p1U6eP9sYfwett26TIoVaIjXvmekat1

  • payload_url

    http://ring1.ug/files/cost/updatewin1.exe

    http://ring1.ug/files/cost/updatewin2.exe

    http://ring1.ug/files/cost/updatewin.exe

    http://ring1.ug/files/cost/3.exe

    http://ring1.ug/files/cost/4.exe

    http://ring1.ug/files/cost/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-h159DSA7cz Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: salesrestoresoftware@firemail.cc Reserve e-mail address to contact us: salesrestoresoftware@gmail.com Your personal ID: 0178Asd374y5iuhld

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 4 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\f04fc281-9252-45cf-aa3d-efd4d5bd9fd1" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1044
    • C:\Users\Admin\AppData\Local\Temp\7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe
      "C:\Users\Admin\AppData\Local\Temp\7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1400

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    Filesize

    727B

    MD5

    d5961e2b0bfff47585def7a142032bc7

    SHA1

    bac522f2bfe929d0a9865bbae4997c966a981239

    SHA256

    8855e233725857c9cfb28ff44edde267c39f56150228c7505f6ce328fdae846a

    SHA512

    46846503eb0e45b98465a78402b2c443eae6d7cbe0b1d8a09399a6a8408444e92a932fb8e1c99fe6505c26d0379d00b026e9fc608e1a2e2af7131a20e7c59f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    589c442fc7a0c70dca927115a700d41e

    SHA1

    66a07dace3afbfd1aa07a47e6875beab62c4bb31

    SHA256

    2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

    SHA512

    1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    471B

    MD5

    b315b3f5f97226f5dd9e59adbdac03e4

    SHA1

    e7f513b703598517413b702f6a7e5db0f479e31a

    SHA256

    16b96325c2dbd241387842c4d464d1098827cbd97abd940647e7893a12243fea

    SHA512

    5650e2c7e80debdd930c016c674390e2fa5c6d7bbdade707785708f4dddecf5a0650bb0c2a52e1015f3c32e510901a70da9fc0e99898b97a6ed945bdb31e1c3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    Filesize

    402B

    MD5

    56c0c1fe983ac05a710b2f282f89dd3c

    SHA1

    1e793ee579b6dc0b5e8af8cdf9b9dcf9d6b7af05

    SHA256

    82c92d70f89751bc3d961912f1dca78b6e82476035a4cdefa8fdd0c5b006462f

    SHA512

    1ba76dd860b63106a4b6268421b7230e919219841650115018afdee87a637a68b441d4c116277a7144f5f4b020115d3161df2e0e287e44fab96bf8c753ed5c34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    561485e1f56d73c8df7955f01c555871

    SHA1

    156a7185680d67ba582574c5d422be2fb50e6987

    SHA256

    fbff9771099981db0497c1c010e431b0a9ceb1a55baa96a1f7075529436cb894

    SHA512

    4a87c4f4eb5f6ceb9cb05674dd6a37c989e778524cd631db76e1c1c8d6c3bd95b60ce95cbd30a18c537a8f2e744f2d5505884c1670e383ebeaa25f56a61d25e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    396B

    MD5

    39b0476091da71ea6139c0e030f1362d

    SHA1

    e8f4ff4337b988e0ddef1c36864da65a6c3629ab

    SHA256

    2af4d4329c9c662d2c20c9cc7f06614a0c55e80a55d2b058638e1242df2f237d

    SHA512

    de9068786e80d029bfd3a9a2727cbd4a75ce0aa5aaaf3bc9a8d4c2439b3d4092f08e09e35619e8fc3ffb4f492e6b3f81e670f779eb08ffd4103a4ed8d536a140

  • C:\Users\Admin\AppData\Local\f04fc281-9252-45cf-aa3d-efd4d5bd9fd1\7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe
    Filesize

    740KB

    MD5

    5aad3088c1ccdb8ce85b137074fa9bd6

    SHA1

    b964df4fe2ae3ab72e54a8e5e362ea8d15305270

    SHA256

    7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3

    SHA512

    26f8cc1b776ccd43073f72f3cd1466744a4437d851234b950ecd84d3c48595584ccb2ccad2e6f086e652e1d54b4735465b70cbdd659a0ca48ae76008b25eb0b1

  • memory/1044-59-0x0000000000000000-mapping.dmp
  • memory/1304-58-0x0000000000400000-0x0000000000C56000-memory.dmp
    Filesize

    8.3MB

  • memory/1304-62-0x0000000000400000-0x0000000000C56000-memory.dmp
    Filesize

    8.3MB

  • memory/1304-54-0x0000000000320000-0x00000000003B1000-memory.dmp
    Filesize

    580KB

  • memory/1304-57-0x0000000000E50000-0x0000000000F6A000-memory.dmp
    Filesize

    1.1MB

  • memory/1304-56-0x0000000000320000-0x00000000003B1000-memory.dmp
    Filesize

    580KB

  • memory/1304-55-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/1400-63-0x0000000000330000-0x00000000003C1000-memory.dmp
    Filesize

    580KB

  • memory/1400-61-0x0000000000000000-mapping.dmp
  • memory/1400-71-0x0000000000330000-0x00000000003C1000-memory.dmp
    Filesize

    580KB

  • memory/1400-72-0x0000000000400000-0x0000000000C56000-memory.dmp
    Filesize

    8.3MB