Analysis
-
max time kernel
153s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe
Resource
win10v2004-20220812-en
General
-
Target
18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe
-
Size
194KB
-
MD5
e23c95d91c7786c48e5273833610046f
-
SHA1
cafcb78b479773cb1ddd5dfeeb3861e967a3772c
-
SHA256
18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423
-
SHA512
061c8716a8c14d7fa1527a5b86e94c1c5b6348d095bd3d64ea4db8e66717de91a2b411c22a4d5fa01c622d82118d2037cf3faefa6de7adc54d648c3daefc2697
-
SSDEEP
3072:6VXmjRFVXL0tfRw05oEZJfrR/jaPDsexSFqnuFMnN0K3/dRhz:oGRFdLCZwoZJfJkDRjnuFO0gx
Malware Config
Extracted
djvu
http://winnlinne.com/lancer/get.php
-
extension
.tury
-
offline_id
Uz66zEbmA32arcxwT81zZhkb23026oHz5iSp8qt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-o7UXxOstmw Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0585Jhyjd
Signatures
-
Detected Djvu ransomware 6 IoCs
resource yara_rule behavioral1/memory/1312-168-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1312-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3276-172-0x0000000002200000-0x000000000231B000-memory.dmp family_djvu behavioral1/memory/1312-170-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1312-178-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1312-182-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/3604-133-0x0000000002040000-0x0000000002049000-memory.dmp family_smokeloader behavioral1/memory/3604-136-0x0000000002040000-0x0000000002049000-memory.dmp family_smokeloader behavioral1/memory/3088-143-0x0000000000590000-0x0000000000599000-memory.dmp family_smokeloader behavioral1/memory/5116-161-0x00000000004B0000-0x00000000004B9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3088 36EA.exe 5116 5EA6.exe 3276 7944.exe 1312 7944.exe -
Loads dropped DLL 1 IoCs
pid Process 4280 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2192 icacls.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\04d9d792-4fd9-4e09-a462-ce5b2865901f\\7944.exe\" --AutoStart" 7944.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 api.2ip.ua 44 api.2ip.ua -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3276 set thread context of 1312 3276 7944.exe 100 -
Program crash 1 IoCs
pid pid_target Process procid_target 4424 5116 WerFault.exe 90 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36EA.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36EA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36EA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3604 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe 3604 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3604 18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3088 36EA.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3088 3036 Process not Found 88 PID 3036 wrote to memory of 3088 3036 Process not Found 88 PID 3036 wrote to memory of 3088 3036 Process not Found 88 PID 3036 wrote to memory of 5116 3036 Process not Found 90 PID 3036 wrote to memory of 5116 3036 Process not Found 90 PID 3036 wrote to memory of 5116 3036 Process not Found 90 PID 3036 wrote to memory of 3276 3036 Process not Found 92 PID 3036 wrote to memory of 3276 3036 Process not Found 92 PID 3036 wrote to memory of 3276 3036 Process not Found 92 PID 3036 wrote to memory of 3996 3036 Process not Found 93 PID 3036 wrote to memory of 3996 3036 Process not Found 93 PID 3036 wrote to memory of 3588 3036 Process not Found 94 PID 3036 wrote to memory of 3588 3036 Process not Found 94 PID 3036 wrote to memory of 3588 3036 Process not Found 94 PID 3036 wrote to memory of 3588 3036 Process not Found 94 PID 3996 wrote to memory of 4280 3996 regsvr32.exe 95 PID 3996 wrote to memory of 4280 3996 regsvr32.exe 95 PID 3996 wrote to memory of 4280 3996 regsvr32.exe 95 PID 3036 wrote to memory of 1688 3036 Process not Found 96 PID 3036 wrote to memory of 1688 3036 Process not Found 96 PID 3036 wrote to memory of 1688 3036 Process not Found 96 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 3276 wrote to memory of 1312 3276 7944.exe 100 PID 1312 wrote to memory of 2192 1312 7944.exe 101 PID 1312 wrote to memory of 2192 1312 7944.exe 101 PID 1312 wrote to memory of 2192 1312 7944.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe"C:\Users\Admin\AppData\Local\Temp\18aa090e0b3d0a2a34083e13726f78c8efd60cf5c0a425859a4fa2dfd6330423.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3604
-
C:\Users\Admin\AppData\Local\Temp\36EA.exeC:\Users\Admin\AppData\Local\Temp\36EA.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3088
-
C:\Users\Admin\AppData\Local\Temp\5EA6.exeC:\Users\Admin\AppData\Local\Temp\5EA6.exe1⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 3402⤵
- Program crash
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\7944.exeC:\Users\Admin\AppData\Local\Temp\7944.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\7944.exeC:\Users\Admin\AppData\Local\Temp\7944.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\04d9d792-4fd9-4e09-a462-ce5b2865901f" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2192
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7BB6.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7BB6.dll2⤵
- Loads dropped DLL
PID:4280
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5116 -ip 51161⤵PID:2504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
195KB
MD50b4f3864efb93d7c5413cb9eaabf587a
SHA1a8a2b31f8ec57b0d7488f725af213248c6cccfb9
SHA256ad7f2ed48ed234dddbb96f3d781704307f0d9def1ea5291d1832597f7aea2e92
SHA5121e475d0622d671f632b6f31a1de4f0a06d64a1b8329ec03496af16780c7e92249b0dde22a9c8fa69692762bc23f42cbc0e6cd194ef3a0b78296956d422601c22
-
Filesize
195KB
MD50b4f3864efb93d7c5413cb9eaabf587a
SHA1a8a2b31f8ec57b0d7488f725af213248c6cccfb9
SHA256ad7f2ed48ed234dddbb96f3d781704307f0d9def1ea5291d1832597f7aea2e92
SHA5121e475d0622d671f632b6f31a1de4f0a06d64a1b8329ec03496af16780c7e92249b0dde22a9c8fa69692762bc23f42cbc0e6cd194ef3a0b78296956d422601c22
-
Filesize
194KB
MD547c6be3e5327af1bfdd2939f5cfc8f16
SHA118af6a23a52e2fd6f705bb6171eedcb612fe0ec2
SHA256a21c3f23ea8a653b6823851ec4d71b8efccfc347939f9a02008e176eb7c68ac1
SHA5121644c75167a47baf24f05c41aa7fd1c1eaa6ec2288171a788cb2e3aed6f75691930bfc22414e7bdbd13605fc874bd302c19ffbae2869ffcfb0cdb6662502ab9d
-
Filesize
194KB
MD547c6be3e5327af1bfdd2939f5cfc8f16
SHA118af6a23a52e2fd6f705bb6171eedcb612fe0ec2
SHA256a21c3f23ea8a653b6823851ec4d71b8efccfc347939f9a02008e176eb7c68ac1
SHA5121644c75167a47baf24f05c41aa7fd1c1eaa6ec2288171a788cb2e3aed6f75691930bfc22414e7bdbd13605fc874bd302c19ffbae2869ffcfb0cdb6662502ab9d
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
713KB
MD5b7bc860cee7201e0c810642890a03246
SHA1d9edc9d61baf9d8cad3f840bba699ffd9219cce0
SHA256ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27
SHA5125e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594
-
Filesize
1.8MB
MD54dca89f3a66ae9ac204beea85d7a3d75
SHA15cc81459e35f27a79047c4e041a65739cc91a067
SHA256223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981
SHA51267dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906
-
Filesize
1.8MB
MD54dca89f3a66ae9ac204beea85d7a3d75
SHA15cc81459e35f27a79047c4e041a65739cc91a067
SHA256223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981
SHA51267dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906