Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    72s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 05:12

General

  • Target

    file.exe

  • Size

    777KB

  • MD5

    b3e457081acad76912cbdf15e3fb1dc7

  • SHA1

    f22cc7127f02bc89995197612cf54f8b58b1c469

  • SHA256

    6d495ef15b5109636e685112122dfe1c5d854fbcf65a698fcb23a838c1c12200

  • SHA512

    3105046d5901efc114711346509f04fec06ed56c4d4f08496d8be2c8dfd828966aa54bb23f315c94db1bf2d9c3cda4fe1c7b0693315fc371a21c0a3488d8f112

  • SSDEEP

    12288:NTQZCuhNEizhIDopI+RuUbLgw5Z7bhYzjdSB9o3/iqSDXHCw8HoUQF09jtTV:tWjEi2DMuUbLRBh8e9oqpn8XX9hTV

Malware Config

Extracted

Family

djvu

C2

http://acacaca.org/test3/get.php

Attributes
  • extension

    .mmvb

  • offline_id

    yd6oYv6aBN90yFzTWdZ34sXSXtXiauzOLXZyWht1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://acacaca.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xuPJqoyzQE Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0556Jhyjd

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\278673d6-db71-42ab-808b-3610077f7e54" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1536
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Users\Admin\AppData\Local\Temp\file.exe
          "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1404
          • C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe
            "C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1996
            • C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe
              "C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    215064dd8b4566627489319b46e9ca43

    SHA1

    7fa698eef5f02a961b5862df135d7ebfd8a12292

    SHA256

    390f76fdb79029603900524df2f0fbfd05bf18a3bbc74b9b05b2a6dc5938393c

    SHA512

    2a5b12b41d728ce30f1712d23226bbefe73111b786156b97126d6497ef234e78feaf6db08c7412eaa336c869b93ab239cd46b33cc31ff2c8497214cba5927753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    7c27ffae0cbd6d55b86f387667635294

    SHA1

    6df10a537a970852086711da85ae84f7355bff72

    SHA256

    b6a9400010fea1af51104c2b48fdd4383d8b7a81bd62a22c188db3cdb7413503

    SHA512

    140752fd448ed5cd01c5463d67b7dd2c5c111fd4256d3686b792bc0ff788bed49fdfe901402fdb080b9a6c0789725dda6256280120fadc5aca1f127a552e13d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    e39f9e156ec75cbafd4fb23963389b17

    SHA1

    d2a33a583aefee1eb0a4ec379eda0b35fdd0f4ab

    SHA256

    3410a4ed96b97bbd0ffeffa4187e068bdea5f939d36ea398e4ceec3309045846

    SHA512

    cf3ef78cf34dc0ee56b48e3414ecef02c68b03a0937cc9698b53a1e281be94bbbc2bf0da8846bf3ff38a51bdde1d3ae536c65136657c132204820369d10b46c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba5fd5afadfbd191efd071d48cbc3df4

    SHA1

    a5ff88235341e05417e5a1ba317fa903e04783e5

    SHA256

    2b099129c050b9eb208df325cd7b4539f90587173edc0b0745c1b18a78f3cb8e

    SHA512

    5c6ca10392db3aa140e28136ad543f22fedc77993e77e7888afb2642266c9888cf16d195ff36549d350628dc812cd8e694141cff406e0bada17353f2d805693f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    548d9b860fc097e2e0497e67230fda3c

    SHA1

    97667f1ead9933e220a010e7ea655eee69acdf66

    SHA256

    9469aae7aec99e5b54efaaa67c6c4770a7f596a7b3873e6c7e44be55cbe82d42

    SHA512

    c5b9df7c5b315eb079a26a12a1967baf52f4e0aea439813680d80edad83941f0eda092f6bd9e8e954b912d66696b45524e042488efc033ad8d9b1d5538252b31

  • C:\Users\Admin\AppData\Local\278673d6-db71-42ab-808b-3610077f7e54\file.exe

    Filesize

    777KB

    MD5

    b3e457081acad76912cbdf15e3fb1dc7

    SHA1

    f22cc7127f02bc89995197612cf54f8b58b1c469

    SHA256

    6d495ef15b5109636e685112122dfe1c5d854fbcf65a698fcb23a838c1c12200

    SHA512

    3105046d5901efc114711346509f04fec06ed56c4d4f08496d8be2c8dfd828966aa54bb23f315c94db1bf2d9c3cda4fe1c7b0693315fc371a21c0a3488d8f112

  • C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe

    Filesize

    383KB

    MD5

    8d7db6982df46c3b0f0cc879d892c08a

    SHA1

    64e3d7ab4793aeb05d18a82159c579e05c45fd71

    SHA256

    116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6

    SHA512

    0eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b

  • C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe

    Filesize

    383KB

    MD5

    8d7db6982df46c3b0f0cc879d892c08a

    SHA1

    64e3d7ab4793aeb05d18a82159c579e05c45fd71

    SHA256

    116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6

    SHA512

    0eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b

  • C:\Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe

    Filesize

    383KB

    MD5

    8d7db6982df46c3b0f0cc879d892c08a

    SHA1

    64e3d7ab4793aeb05d18a82159c579e05c45fd71

    SHA256

    116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6

    SHA512

    0eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b

  • \Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe

    Filesize

    383KB

    MD5

    8d7db6982df46c3b0f0cc879d892c08a

    SHA1

    64e3d7ab4793aeb05d18a82159c579e05c45fd71

    SHA256

    116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6

    SHA512

    0eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b

  • \Users\Admin\AppData\Local\2c725071-127d-4622-a5ba-ed6e1242265c\build2.exe

    Filesize

    383KB

    MD5

    8d7db6982df46c3b0f0cc879d892c08a

    SHA1

    64e3d7ab4793aeb05d18a82159c579e05c45fd71

    SHA256

    116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6

    SHA512

    0eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b

  • memory/524-86-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/524-94-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/524-92-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/964-57-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/964-59-0x0000000002210000-0x000000000232B000-memory.dmp

    Filesize

    1.1MB

  • memory/964-54-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/1404-73-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1404-95-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1404-80-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1796-71-0x00000000008D0000-0x0000000000961000-memory.dmp

    Filesize

    580KB

  • memory/1796-67-0x00000000008D0000-0x0000000000961000-memory.dmp

    Filesize

    580KB

  • memory/1860-55-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1860-60-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB

  • memory/1860-61-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1860-62-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1860-66-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1996-88-0x00000000009FB000-0x0000000000A27000-memory.dmp

    Filesize

    176KB

  • memory/1996-91-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB