Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 13:43

General

  • Target

    b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe

  • Size

    755KB

  • MD5

    0c48c222423feb7b61203168e7a38719

  • SHA1

    8b6936e5b72cf4924f3d8f8daf033e15075b2819

  • SHA256

    b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d

  • SHA512

    88f03dfc1771371ed83025d5ad1f4e28df507051a162334435fbad020c8505271f6ad22de226434dba20d32f17d91b21f9420519839a1977692c8c31e29d4da4

  • SSDEEP

    12288:t5/d1/kBmxX7MjCdHRn3K8OyQy2KguyVcNWw7fhfUsmDBpfvi0RV0:tP1/kAKCdHRn3PO3y2KguGcNpfhfUsmY

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .hhuy

  • offline_id

    gG3wF8nDWRqLztkHPAxMzpvNVlmLBMgQKmKiCNt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-5zKXJl7cwi Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0834ASdw

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe
    "C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe
      "C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\f1e632e1-0bad-49ec-8046-fa709da14a78" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:4024
      • C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe
        "C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe
          "C:\Users\Admin\AppData\Local\Temp\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Users\Admin\AppData\Local\e9f04fb6-b2d1-4762-8c43-8ef753bb80e6\build2.exe
            "C:\Users\Admin\AppData\Local\e9f04fb6-b2d1-4762-8c43-8ef753bb80e6\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4080
            • C:\Users\Admin\AppData\Local\e9f04fb6-b2d1-4762-8c43-8ef753bb80e6\build2.exe
              "C:\Users\Admin\AppData\Local\e9f04fb6-b2d1-4762-8c43-8ef753bb80e6\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:2380
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2116
                7⤵
                • Program crash
                PID:2604
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2380 -ip 2380
    1⤵
      PID:436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      ef5eacef00175aa65de8fb92c9a48cf8

      SHA1

      8518ea998c6f561f538aad051219eea5538741ec

      SHA256

      2f2d987db9bcd908f25cb407b8c39d24678b5d2ce3427a51f223d6a1893a7297

      SHA512

      ce0c0ba01028c27bd6d5222562054afe9d08893320e787fa789f60213b94ff23a0f5bdd25ca8f48a298260071d9a9b73eb9be7b0695e1a75808d5461e4ab6dd3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      a57ff00e27037881a35bf4fe6e100837

      SHA1

      1859723564a64a9178ae312ff38c791149d49ff4

      SHA256

      4b3429d8e04fa00a18aa44a12d5d8baf71698dd95611cc3415cc36f7daf53c2c

      SHA512

      48dfbbe589aa6b116ab1315508a7c0f1e24934028dd6ecb14583bc77aa7a5a7d0cda5ee093d975b86ffa8274006203d2e4107ba40c3deb216b50bca94a1ba3da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      392B

      MD5

      77c4377cb8c413857b05e1893906a26d

      SHA1

      c94e490559ed40783a1c72c96b173d12f0b7ee18

      SHA256

      716fd45ac466148b5d1e86164e0c23b75ffb55dc18a5169beb3bdb90daa66330

      SHA512

      196df96726c4ab0a1885ab4424c21c9045ff163ba2bab6ab1ff244a0303c256a43f9ace18e9fbde1dc9cbc143f19d9faa61e0fb443bedb2bab57ef7cba4e0111

    • C:\Users\Admin\AppData\Local\e9f04fb6-b2d1-4762-8c43-8ef753bb80e6\build2.exe

      Filesize

      192KB

      MD5

      2449def686158fff9801f567489d9c1f

      SHA1

      a26a611f6c8f43745d69a6138e07f8f32b09fa3f

      SHA256

      4230571aea510591a55384cedd110eb4c220014ccda30d2d7018dcee89c7770b

      SHA512

      9fe324902e5c31e6db664b40074ffcc03cd1c13606e9e6c4e156e71cb89d1e234477454df3debbccfe5b9e2c88b52e6e8f7746832a6f2f4d4ad6a9eb0d75000b

    • C:\Users\Admin\AppData\Local\f1e632e1-0bad-49ec-8046-fa709da14a78\b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d.exe

      Filesize

      755KB

      MD5

      0c48c222423feb7b61203168e7a38719

      SHA1

      8b6936e5b72cf4924f3d8f8daf033e15075b2819

      SHA256

      b6adcae256ebf5341bea840bc37689e3eb86a63be1abf04c01ccbd428cddbd2d

      SHA512

      88f03dfc1771371ed83025d5ad1f4e28df507051a162334435fbad020c8505271f6ad22de226434dba20d32f17d91b21f9420519839a1977692c8c31e29d4da4

    • memory/1524-6-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/1524-15-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/1524-5-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/1524-4-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/1524-3-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/2380-66-0x0000000000400000-0x000000000063F000-memory.dmp

      Filesize

      2.2MB

    • memory/2380-53-0x0000000000400000-0x000000000063F000-memory.dmp

      Filesize

      2.2MB

    • memory/2380-52-0x0000000000400000-0x000000000063F000-memory.dmp

      Filesize

      2.2MB

    • memory/2380-47-0x0000000000400000-0x000000000063F000-memory.dmp

      Filesize

      2.2MB

    • memory/3524-19-0x00000000025C0000-0x000000000265C000-memory.dmp

      Filesize

      624KB

    • memory/3744-28-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-21-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-32-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-34-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-35-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-69-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-20-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-54-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-27-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3744-22-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4080-51-0x00000000009B0000-0x00000000009DB000-memory.dmp

      Filesize

      172KB

    • memory/4080-50-0x0000000000A80000-0x0000000000B80000-memory.dmp

      Filesize

      1024KB

    • memory/5104-2-0x0000000002740000-0x000000000285B000-memory.dmp

      Filesize

      1.1MB

    • memory/5104-1-0x0000000002650000-0x00000000026ED000-memory.dmp

      Filesize

      628KB