Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-12-2023 09:30

General

  • Target

    7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe

  • Size

    750KB

  • MD5

    24c934eca55ba7dd5f9c534c0a027fd7

  • SHA1

    9b6a9d6158319e42ed89ab6c99266fd13a57682e

  • SHA256

    7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a

  • SHA512

    3fffa0f0703a6b20804c0e25377f86797cdf9a7996e29142330fbc45768de94c056cf601f428586556f611ea9506159b880261b09d89130f21f9afc2c183a214

  • SSDEEP

    12288:1oHDbvyBQZNvln+Zu4bj2wbwaDBh3DTGv8K86NUHrnLAd3U/W3bBDsTaXI+NKv:1EDbaBQZyIOLbwaFh3D2xmTLAdk+LKay

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .jazi

  • offline_id

    UlJXrkKDIkENh0vb5W9For2Yyh6riGytjO5p2St1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iu965qqEb1 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0830Usdk

rsa_pubkey.plain

Extracted

Family

vidar

Version

6.7

Botnet

aef20f7eb91ec5457d74e4fa0796c2bf

C2

https://t.me/s4p0g

https://steamcommunity.com/profiles/76561199575355834

Attributes
  • profile_id_v2

    aef20f7eb91ec5457d74e4fa0796c2bf

Signatures

  • Detected Djvu ransomware 17 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe
    "C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe
      "C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\640d84f5-a0a7-43dd-85b4-6a6fee04b18b" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:4008
      • C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe
        "C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe
          "C:\Users\Admin\AppData\Local\Temp\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe
            "C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4620
            • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe
              "C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:5112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1936
                7⤵
                • Program crash
                PID:4484
          • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe
            "C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe
              "C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2876
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:5032
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4820
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:444
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    6a1c010468acf13f71d518cc418e0f0c

    SHA1

    e89d312d492ad10ecbd783087b9e746863b3176c

    SHA256

    04e650c7f37ea6c059b5d352e7f8eb5bc155442f941520c6e9d374d5e505b72a

    SHA512

    e7a3961b07ed24783525397476f98096d5ae08d7c3060c894897a562fb59266419ced93674a7215439bcb74bb20b8aed7992acd99d9e028fd9fcb63cd68d02af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    4f8b004540aee29a81fc82676f5333fd

    SHA1

    1a1f5ea72f62ace444ec41d25dd9b524a66d39b3

    SHA256

    c6a09c6f903df9ce58899616b50a685d4dd0e5ca28bfc55c1bdc7c8cc7e7df3e

    SHA512

    4cad5efab707809ba5167903bd99036fa4675c26b7a24da4b51993612a7c9398a9730cee8fb49fb1635dbca50e5726c614e6e05484d1c1ac1d81360df638275a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    7fc99df7316a615c524513b364447d4d

    SHA1

    d23e28f28e6688edfcf450b058c3db6392fc3215

    SHA256

    21c3b02656a531112b8bce92dc0afad74e3a6a737b4b97f757caafe3875db0d3

    SHA512

    db0a2a425ff552c6ffdb5ac854dad9eb7599de1afebbab7a414f7fe0ff56461267babfd3588c65a51a996e74625b1ff96104b821c89b6a6e69ebe13846459181

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe

    Filesize

    328KB

    MD5

    8d6be514da06d4376ac1effe95572578

    SHA1

    c2a7b7ae2e895bcfe4455e9b18f3336249a496c5

    SHA256

    7658a56d7ea6afcc08a4f44652e04d98b5f83b8ec232b341ffa59aa77cd568ec

    SHA512

    b13d721d65fb1a54f067805f72ea32e2a9ff729d0898024f880fec51647292c9a55d0c8f9498e5573eb8c5597810011dccb96167f86be44a55348c4bb65bd13a

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe

    Filesize

    328KB

    MD5

    8d6be514da06d4376ac1effe95572578

    SHA1

    c2a7b7ae2e895bcfe4455e9b18f3336249a496c5

    SHA256

    7658a56d7ea6afcc08a4f44652e04d98b5f83b8ec232b341ffa59aa77cd568ec

    SHA512

    b13d721d65fb1a54f067805f72ea32e2a9ff729d0898024f880fec51647292c9a55d0c8f9498e5573eb8c5597810011dccb96167f86be44a55348c4bb65bd13a

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build2.exe

    Filesize

    328KB

    MD5

    8d6be514da06d4376ac1effe95572578

    SHA1

    c2a7b7ae2e895bcfe4455e9b18f3336249a496c5

    SHA256

    7658a56d7ea6afcc08a4f44652e04d98b5f83b8ec232b341ffa59aa77cd568ec

    SHA512

    b13d721d65fb1a54f067805f72ea32e2a9ff729d0898024f880fec51647292c9a55d0c8f9498e5573eb8c5597810011dccb96167f86be44a55348c4bb65bd13a

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Local\0b7959ca-6453-4622-85a9-84c51076c453\build3.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Local\640d84f5-a0a7-43dd-85b4-6a6fee04b18b\7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a.exe

    Filesize

    750KB

    MD5

    24c934eca55ba7dd5f9c534c0a027fd7

    SHA1

    9b6a9d6158319e42ed89ab6c99266fd13a57682e

    SHA256

    7529a823c08d465d83e92e3b9e35b9ee598e71ca4adfaa81fb98216542ac784a

    SHA512

    3fffa0f0703a6b20804c0e25377f86797cdf9a7996e29142330fbc45768de94c056cf601f428586556f611ea9506159b880261b09d89130f21f9afc2c183a214

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    299KB

    MD5

    41b883a061c95e9b9cb17d4ca50de770

    SHA1

    1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

    SHA256

    fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

    SHA512

    cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

  • memory/444-123-0x0000000000A20000-0x0000000000B20000-memory.dmp

    Filesize

    1024KB

  • memory/864-99-0x00000000008B9000-0x00000000008C9000-memory.dmp

    Filesize

    64KB

  • memory/1436-55-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-45-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-40-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-38-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-24-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-34-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-33-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-41-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-26-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1436-25-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2248-23-0x0000000002510000-0x00000000025AB000-memory.dmp

    Filesize

    620KB

  • memory/2268-74-0x0000000002290000-0x0000000002294000-memory.dmp

    Filesize

    16KB

  • memory/2268-72-0x00000000009F0000-0x0000000000AF0000-memory.dmp

    Filesize

    1024KB

  • memory/2876-76-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2876-77-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2876-79-0x0000000000410000-0x00000000004D5000-memory.dmp

    Filesize

    788KB

  • memory/2876-71-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3192-1-0x00000000023B0000-0x000000000244C000-memory.dmp

    Filesize

    624KB

  • memory/3192-2-0x0000000002570000-0x000000000268B000-memory.dmp

    Filesize

    1.1MB

  • memory/4620-59-0x0000000002CE0000-0x0000000002DE0000-memory.dmp

    Filesize

    1024KB

  • memory/4620-60-0x0000000004580000-0x00000000045B7000-memory.dmp

    Filesize

    220KB

  • memory/4708-19-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4708-6-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4708-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4708-4-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4708-3-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5112-65-0x0000000000400000-0x0000000000649000-memory.dmp

    Filesize

    2.3MB

  • memory/5112-64-0x0000000000400000-0x0000000000649000-memory.dmp

    Filesize

    2.3MB

  • memory/5112-81-0x0000000000400000-0x0000000000649000-memory.dmp

    Filesize

    2.3MB

  • memory/5112-61-0x0000000000400000-0x0000000000649000-memory.dmp

    Filesize

    2.3MB