Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-03-2023 01:13

General

  • Target

    b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe

  • Size

    789KB

  • MD5

    4a840c4933e0b53e8176d9c6d4d5cf03

  • SHA1

    1c4f48707754c66a3b7253d1d800c12be559d7ac

  • SHA256

    b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff

  • SHA512

    a291c9593781df010cb042a5e376cfebaab97ec3088f3f88a8f73c6c2d314bebb02a4c6a4e16d8091d27fde5e50d7afa5b2128cbd4e46a048548125c8bded96f

  • SSDEEP

    12288:WOYsss0mhNB25eKHh3MP/a0Soog6fDQFIIk4c/I3yjANf0W1aeZvkmxd8VcW1Zk8:UxKBCHRUySbaIk4c/INfAAMSdBka0

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .dazx

  • offline_id

    8EM6M9LqEzIk18qaQ87WiPQ1u84RRdej5V1ovht1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-vbVkogQdu2 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0666JOsie

rsa_pubkey.plain

Extracted

Family

vidar

Version

3

Botnet

d6ef050131e7d5a1d595c51613328971

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    d6ef050131e7d5a1d595c51613328971

Signatures

  • Detected Djvu ransomware 12 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe
    "C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe
      "C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\ba222194-3e0e-44aa-9126-8d4cae999a9a" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:832
      • C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe
        "C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe
          "C:\Users\Admin\AppData\Local\Temp\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
            "C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
              "C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:1596
          • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
            "C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:888
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:624

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    Filesize

    2KB

    MD5

    84770e5e2da7dbc35f74f1301910fea1

    SHA1

    bd6156f63c93c2bc668dbd796d27474700cbff84

    SHA256

    97a616430f4f8b8a76004f3ffab182f6a01870267c53387960f71f56c3dae1c5

    SHA512

    6241fec66ad5219fa31ad47fdd93dea2ef079cfd600d3ec1ca48fe64d028d76a82984113a5052b74de8d678d183e2bafb965f3c6111f3cdf139239b07dfee941

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    1KB

    MD5

    110cf742e7da59e417e5b51e23c5a044

    SHA1

    2fe4ee009a9a99de850dd8d6d92c9d4837f444d2

    SHA256

    ebe97ccfc0c50239665d939f865896143ffcb6921361e18dcba32b3bfa19a633

    SHA512

    117498742030a11f129b3b3281f304ad50c53dd39d638af0ad0f6234a1207efc6622d5d886806b376e7ae773feef177afc74449adbda16a40b31588017d5c4a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    Filesize

    488B

    MD5

    b84fa79db0d3ce67c9d033c50d888a1f

    SHA1

    6d5e6fcc833ef10b6023594b268f0f7638c17131

    SHA256

    bfdf50bf7e53ca700f92734bf96ec9a9d04f918fe53e3f87671fc92a2fc787c0

    SHA512

    cc4c303be458bbb9f0e28e3d5c94257126833650a5696f3db33977394a6cbc5a2999ffb1c3a3849ab90ea122d5b82c433067c0a000945438f98a39d534b17f57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    304B

    MD5

    ff72d545b41d1126d8c7c1f192fa9fdc

    SHA1

    d8521a8af1e6c81231099a905d61022131b499f8

    SHA256

    f0b31c895cb20bd8e9b87f6ae051be8ca9acc06c5b401f5e2a83cca3f5538b3e

    SHA512

    51ed1709334c3fd5576ffa2313eca39c4102b218cc2e5193e7d93075b65e281ff94d80459b018306f3b658db15dbbcf4b2cbd0b2360517daecec732287cbb35c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    Filesize

    482B

    MD5

    2c4d1dcfc80ab5894810ef8b65857708

    SHA1

    9d169760150e14439f6e9aff86a88f874a11633d

    SHA256

    840aa4b86122946e67528f4cd4a7830ccedefedce6f00c6691118e173dd75e1f

    SHA512

    de815f78b14f7387255475ac2784d576c8adc190204c77c8138ec3d721e4922e33a77374be3fac8d86d5c4fd28953bf6fd735ecf7833b521f3065709b2ff975b

  • C:\Users\Admin\AppData\Local\Temp\Tar59B6.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
    Filesize

    9KB

    MD5

    9ead10c08e72ae41921191f8db39bc16

    SHA1

    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

    SHA256

    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

    SHA512

    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
    Filesize

    9KB

    MD5

    9ead10c08e72ae41921191f8db39bc16

    SHA1

    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

    SHA256

    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

    SHA512

    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

  • C:\Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
    Filesize

    9KB

    MD5

    9ead10c08e72ae41921191f8db39bc16

    SHA1

    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

    SHA256

    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

    SHA512

    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

  • C:\Users\Admin\AppData\Local\ba222194-3e0e-44aa-9126-8d4cae999a9a\b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff.exe
    Filesize

    789KB

    MD5

    4a840c4933e0b53e8176d9c6d4d5cf03

    SHA1

    1c4f48707754c66a3b7253d1d800c12be559d7ac

    SHA256

    b46208e80d15f87e4dcb855aa1972e4e4a0fcad0048f2e5a3a72604e0d9229ff

    SHA512

    a291c9593781df010cb042a5e376cfebaab97ec3088f3f88a8f73c6c2d314bebb02a4c6a4e16d8091d27fde5e50d7afa5b2128cbd4e46a048548125c8bded96f

  • \Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • \Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build2.exe
    Filesize

    462KB

    MD5

    1ea00519a643ae1ab0f4f9a6ecc81ead

    SHA1

    551c4fd300092a51a7fd3ceee009db249fd2a70f

    SHA256

    04e8128c405994d18f26b6394b32686c6e07a65b2c90c98f16295a48a16ba683

    SHA512

    187897c856c6b7b45d9f85898103b8560d25c694c150c1c1efd1370be0c4e3ba3799d2f4c3cc5c2618b0a84f80cff19cf9be47d0961df20c47b73783f6d0491d

  • \Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
    Filesize

    9KB

    MD5

    9ead10c08e72ae41921191f8db39bc16

    SHA1

    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

    SHA256

    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

    SHA512

    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

  • \Users\Admin\AppData\Local\a4272e97-6d8e-42db-adf4-64a57e6dc14e\build3.exe
    Filesize

    9KB

    MD5

    9ead10c08e72ae41921191f8db39bc16

    SHA1

    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

    SHA256

    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

    SHA512

    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

  • memory/868-98-0x00000000002D0000-0x0000000000361000-memory.dmp
    Filesize

    580KB

  • memory/1076-118-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-119-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-120-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-136-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-104-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-156-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1076-138-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/1212-54-0x00000000042A0000-0x0000000004331000-memory.dmp
    Filesize

    580KB

  • memory/1212-58-0x0000000004430000-0x000000000454B000-memory.dmp
    Filesize

    1.1MB

  • memory/1596-148-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1596-141-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/1816-147-0x0000000000310000-0x000000000036D000-memory.dmp
    Filesize

    372KB

  • memory/2036-60-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2036-97-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2036-59-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2036-56-0x0000000000400000-0x0000000000537000-memory.dmp
    Filesize

    1.2MB

  • memory/2036-55-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB