Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-09-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe
Resource
win10-20220812-en
General
-
Target
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe
-
Size
146KB
-
MD5
78ebf51d0b3a9c216d053b8e2cf37247
-
SHA1
05a05c433d732bd6c43a1047ef3c47717926adcf
-
SHA256
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a
-
SHA512
3d19cd8588520d36a1bf332138b94af76c94df41620e478aa7f04cb735eb014f27c53b0e530825815ea6655edd1c515791f26789040170e58d321ff34ad7e064
-
SSDEEP
3072:FqPUmoCsVPRYIibVhX6q0ivewkQmEKhHV5QKs:tb6bFxveHQmfv5C
Malware Config
Extracted
djvu
http://winnlinne.com/lancer/get.php
-
extension
.ofww
-
offline_id
xkNzhkB1wvgoDI7Uo0HPNLY3qCuwoFpP7nlhlut1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EWKSsSJiVn Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0569Jhyjd
Signatures
-
Detected Djvu ransomware 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4584-360-0x0000000002220000-0x000000000233B000-memory.dmp family_djvu behavioral1/memory/4464-355-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/4464-445-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4464-668-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2424-147-0x0000000000800000-0x0000000000809000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
Processes:
E7A6.exeF459.exe4C6.exeE7A6.exepid process 4584 E7A6.exe 1344 F459.exe 3360 4C6.exe 4464 E7A6.exe -
Deletes itself 1 IoCs
Processes:
pid process 2276 -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2632 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
E7A6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\4d926188-4cfa-465c-a5fa-fd1941922d6b\\E7A6.exe\" --AutoStart" E7A6.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 api.2ip.ua 10 api.2ip.ua -
Suspicious use of SetThreadContext 1 IoCs
Processes:
E7A6.exedescription pid process target process PID 4584 set thread context of 4464 4584 E7A6.exe E7A6.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exepid process 2424 fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe 2424 fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 2276 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2276 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exepid process 2424 fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe 2276 2276 2276 2276 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 2276 Token: SeCreatePagefilePrivilege 2276 Token: SeIncreaseQuotaPrivilege 3168 wmic.exe Token: SeSecurityPrivilege 3168 wmic.exe Token: SeTakeOwnershipPrivilege 3168 wmic.exe Token: SeLoadDriverPrivilege 3168 wmic.exe Token: SeSystemProfilePrivilege 3168 wmic.exe Token: SeSystemtimePrivilege 3168 wmic.exe Token: SeProfSingleProcessPrivilege 3168 wmic.exe Token: SeIncBasePriorityPrivilege 3168 wmic.exe Token: SeCreatePagefilePrivilege 3168 wmic.exe Token: SeBackupPrivilege 3168 wmic.exe Token: SeRestorePrivilege 3168 wmic.exe Token: SeShutdownPrivilege 3168 wmic.exe Token: SeDebugPrivilege 3168 wmic.exe Token: SeSystemEnvironmentPrivilege 3168 wmic.exe Token: SeRemoteShutdownPrivilege 3168 wmic.exe Token: SeUndockPrivilege 3168 wmic.exe Token: SeManageVolumePrivilege 3168 wmic.exe Token: 33 3168 wmic.exe Token: 34 3168 wmic.exe Token: 35 3168 wmic.exe Token: 36 3168 wmic.exe Token: SeIncreaseQuotaPrivilege 3168 wmic.exe Token: SeSecurityPrivilege 3168 wmic.exe Token: SeTakeOwnershipPrivilege 3168 wmic.exe Token: SeLoadDriverPrivilege 3168 wmic.exe Token: SeSystemProfilePrivilege 3168 wmic.exe Token: SeSystemtimePrivilege 3168 wmic.exe Token: SeProfSingleProcessPrivilege 3168 wmic.exe Token: SeIncBasePriorityPrivilege 3168 wmic.exe Token: SeCreatePagefilePrivilege 3168 wmic.exe Token: SeBackupPrivilege 3168 wmic.exe Token: SeRestorePrivilege 3168 wmic.exe Token: SeShutdownPrivilege 3168 wmic.exe Token: SeDebugPrivilege 3168 wmic.exe Token: SeSystemEnvironmentPrivilege 3168 wmic.exe Token: SeRemoteShutdownPrivilege 3168 wmic.exe Token: SeUndockPrivilege 3168 wmic.exe Token: SeManageVolumePrivilege 3168 wmic.exe Token: 33 3168 wmic.exe Token: 34 3168 wmic.exe Token: 35 3168 wmic.exe Token: 36 3168 wmic.exe Token: SeShutdownPrivilege 2276 Token: SeCreatePagefilePrivilege 2276 Token: SeIncreaseQuotaPrivilege 996 WMIC.exe Token: SeSecurityPrivilege 996 WMIC.exe Token: SeTakeOwnershipPrivilege 996 WMIC.exe Token: SeLoadDriverPrivilege 996 WMIC.exe Token: SeSystemProfilePrivilege 996 WMIC.exe Token: SeSystemtimePrivilege 996 WMIC.exe Token: SeProfSingleProcessPrivilege 996 WMIC.exe Token: SeIncBasePriorityPrivilege 996 WMIC.exe Token: SeCreatePagefilePrivilege 996 WMIC.exe Token: SeBackupPrivilege 996 WMIC.exe Token: SeRestorePrivilege 996 WMIC.exe Token: SeShutdownPrivilege 996 WMIC.exe Token: SeDebugPrivilege 996 WMIC.exe Token: SeSystemEnvironmentPrivilege 996 WMIC.exe Token: SeRemoteShutdownPrivilege 996 WMIC.exe Token: SeUndockPrivilege 996 WMIC.exe Token: SeManageVolumePrivilege 996 WMIC.exe Token: 33 996 WMIC.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
regsvr32.exeE7A6.exeF459.exeE7A6.execmd.execmd.exedescription pid process target process PID 2276 wrote to memory of 2132 2276 regsvr32.exe PID 2276 wrote to memory of 2132 2276 regsvr32.exe PID 2132 wrote to memory of 2632 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 2632 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 2632 2132 regsvr32.exe regsvr32.exe PID 2276 wrote to memory of 4584 2276 E7A6.exe PID 2276 wrote to memory of 4584 2276 E7A6.exe PID 2276 wrote to memory of 4584 2276 E7A6.exe PID 2276 wrote to memory of 1344 2276 F459.exe PID 2276 wrote to memory of 1344 2276 F459.exe PID 2276 wrote to memory of 1344 2276 F459.exe PID 2276 wrote to memory of 3360 2276 4C6.exe PID 2276 wrote to memory of 3360 2276 4C6.exe PID 2276 wrote to memory of 3360 2276 4C6.exe PID 2276 wrote to memory of 3576 2276 explorer.exe PID 2276 wrote to memory of 3576 2276 explorer.exe PID 2276 wrote to memory of 3576 2276 explorer.exe PID 2276 wrote to memory of 3576 2276 explorer.exe PID 2276 wrote to memory of 4672 2276 explorer.exe PID 2276 wrote to memory of 4672 2276 explorer.exe PID 2276 wrote to memory of 4672 2276 explorer.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 4584 wrote to memory of 4464 4584 E7A6.exe E7A6.exe PID 1344 wrote to memory of 3168 1344 F459.exe wmic.exe PID 1344 wrote to memory of 3168 1344 F459.exe wmic.exe PID 1344 wrote to memory of 3168 1344 F459.exe wmic.exe PID 4464 wrote to memory of 64 4464 E7A6.exe icacls.exe PID 4464 wrote to memory of 64 4464 E7A6.exe icacls.exe PID 4464 wrote to memory of 64 4464 E7A6.exe icacls.exe PID 1344 wrote to memory of 3776 1344 F459.exe cmd.exe PID 1344 wrote to memory of 3776 1344 F459.exe cmd.exe PID 1344 wrote to memory of 3776 1344 F459.exe cmd.exe PID 3776 wrote to memory of 996 3776 cmd.exe WMIC.exe PID 3776 wrote to memory of 996 3776 cmd.exe WMIC.exe PID 3776 wrote to memory of 996 3776 cmd.exe WMIC.exe PID 1344 wrote to memory of 1320 1344 F459.exe cmd.exe PID 1344 wrote to memory of 1320 1344 F459.exe cmd.exe PID 1344 wrote to memory of 1320 1344 F459.exe cmd.exe PID 1320 wrote to memory of 4084 1320 cmd.exe WMIC.exe PID 1320 wrote to memory of 4084 1320 cmd.exe WMIC.exe PID 1320 wrote to memory of 4084 1320 cmd.exe WMIC.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe"C:\Users\Admin\AppData\Local\Temp\fe59760f654a4aca41224daca1fee8c767b36b26394ccf3977c09d5b0878dd8a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2424
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\E302.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\E302.dll2⤵
- Loads dropped DLL
PID:2632
-
C:\Users\Admin\AppData\Local\Temp\E7A6.exeC:\Users\Admin\AppData\Local\Temp\E7A6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\E7A6.exeC:\Users\Admin\AppData\Local\Temp\E7A6.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\4d926188-4cfa-465c-a5fa-fd1941922d6b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:64
-
C:\Users\Admin\AppData\Local\Temp\F459.exeC:\Users\Admin\AppData\Local\Temp\F459.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\4C6.exeC:\Users\Admin\AppData\Local\Temp\4C6.exe1⤵
- Executes dropped EXE
PID:3360
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD51a46061adcf713ccfa1769fd7ad89f37
SHA13d9a5074f4010250f8d27543190ae792fb3b7fcb
SHA256ba9ed3944e8ec8bfa8140d6b737f7275a14041e54b8e635edc6f7b9d7b9d60b1
SHA5125c20758cf5aac63bf575d49b963d9a0e4426026be869c31c2568184c2666752eb7dcb44f56e92f881083e655b6361b130dd3cff5a5bd7a998feaca1680ae2047
-
Filesize
8.9MB
MD51a46061adcf713ccfa1769fd7ad89f37
SHA13d9a5074f4010250f8d27543190ae792fb3b7fcb
SHA256ba9ed3944e8ec8bfa8140d6b737f7275a14041e54b8e635edc6f7b9d7b9d60b1
SHA5125c20758cf5aac63bf575d49b963d9a0e4426026be869c31c2568184c2666752eb7dcb44f56e92f881083e655b6361b130dd3cff5a5bd7a998feaca1680ae2047
-
Filesize
1.9MB
MD567fdb82fdbc2b7c96197e1e7910221d5
SHA1a04e893b5e681ec1dd4b4518704b1e8f4e3ea2d4
SHA2568a914b14659e7c2346089fa7a6f43755d94cf89fd56de4c1a7f6aa60ab451a2e
SHA5125ad03c8b6b9e242b84f85cc0a8637164d1a0aaa5dd1994a9f2d567de65beac2b19ba2533277eeb22c068122eb5fca45435799398fc0e3031384bffdeeb1078fc
-
Filesize
804KB
MD5882a96452e0073218ab82ebc8844281b
SHA1e36ad67193b1e3175290d68284eea511d5bb2a17
SHA256398688e1e89e802326e6867bd0c3197f10de218371d70a61cff39dd9a80a8a60
SHA512e5d798d6c2a4dd7207307fdd9133ae2fb5c758c37da7cdc35a435c2288141a847b04d3546cf1e965eeeca5849b8ac8bb3b7a58b56ece83d9ba1e3b3b9315f482
-
Filesize
804KB
MD5882a96452e0073218ab82ebc8844281b
SHA1e36ad67193b1e3175290d68284eea511d5bb2a17
SHA256398688e1e89e802326e6867bd0c3197f10de218371d70a61cff39dd9a80a8a60
SHA512e5d798d6c2a4dd7207307fdd9133ae2fb5c758c37da7cdc35a435c2288141a847b04d3546cf1e965eeeca5849b8ac8bb3b7a58b56ece83d9ba1e3b3b9315f482
-
Filesize
804KB
MD5882a96452e0073218ab82ebc8844281b
SHA1e36ad67193b1e3175290d68284eea511d5bb2a17
SHA256398688e1e89e802326e6867bd0c3197f10de218371d70a61cff39dd9a80a8a60
SHA512e5d798d6c2a4dd7207307fdd9133ae2fb5c758c37da7cdc35a435c2288141a847b04d3546cf1e965eeeca5849b8ac8bb3b7a58b56ece83d9ba1e3b3b9315f482
-
Filesize
4.3MB
MD52f3ab25b4bc37d6f7458b51ad51d4d91
SHA121e6d68e83303c5b385c70dce3dc467399263a27
SHA2568320c73583b7638cffdf3ba722a6b3fc76b9e8531127a1141157b45b231e0eab
SHA512df141ff59de2a6495b7f4ad6e64ab21514efd125576ff54563eed1c807a5027773672a286290e8a9b472f5227ef730bc41b78a18ae2637371ced094e76d5424b
-
Filesize
4.3MB
MD52f3ab25b4bc37d6f7458b51ad51d4d91
SHA121e6d68e83303c5b385c70dce3dc467399263a27
SHA2568320c73583b7638cffdf3ba722a6b3fc76b9e8531127a1141157b45b231e0eab
SHA512df141ff59de2a6495b7f4ad6e64ab21514efd125576ff54563eed1c807a5027773672a286290e8a9b472f5227ef730bc41b78a18ae2637371ced094e76d5424b
-
Filesize
1.9MB
MD567fdb82fdbc2b7c96197e1e7910221d5
SHA1a04e893b5e681ec1dd4b4518704b1e8f4e3ea2d4
SHA2568a914b14659e7c2346089fa7a6f43755d94cf89fd56de4c1a7f6aa60ab451a2e
SHA5125ad03c8b6b9e242b84f85cc0a8637164d1a0aaa5dd1994a9f2d567de65beac2b19ba2533277eeb22c068122eb5fca45435799398fc0e3031384bffdeeb1078fc