Analysis
-
max time kernel
39s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
3edbc9c7553dad54925210b7f9ece36c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3edbc9c7553dad54925210b7f9ece36c.exe
Resource
win10v2004-20231215-en
General
-
Target
3edbc9c7553dad54925210b7f9ece36c.exe
-
Size
301KB
-
MD5
3edbc9c7553dad54925210b7f9ece36c
-
SHA1
57014d3163d27b21075c37d993c14a56cf7208da
-
SHA256
596be482747a9c9fe559196b0a389de92eeeea2b305777c2d1800f9c014c22ce
-
SHA512
2944c936c953478fdc496b90428296080f49f91de136b36c88ef95b330ad8300d560291d7d14b98e168b8f589482e6f4cb0ad08102c2f16721d0d54f7c1773b1
-
SSDEEP
6144:jTisyjd2Gdq45dCnn0jiXXg/RHnpVeVs4:/VGYGs45dCnnFXkVeu
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
djvu
http://zexeq.com/test1/get.php
-
extension
.loqw
-
offline_id
NrqpaQRhQqq5l2tBPp1QS34I3ME2IKsAlZ0A9pt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-MhbiRFXgXD Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0838ASdw
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral2/memory/4100-38-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4828-37-0x0000000004150000-0x000000000426B000-memory.dmp family_djvu behavioral2/memory/4100-40-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-41-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-42-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1360-61-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1360-62-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1360-64-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation FF51.exe -
Deletes itself 1 IoCs
pid Process 3428 Process not Found -
Executes dropped EXE 7 IoCs
pid Process 1688 E81E.exe 3688 E81E.exe 4828 FF51.exe 4100 FF51.exe 4884 FF51.exe 3468 ABC.exe 1360 FF51.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4660 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b838bee8-ca3a-4746-a576-61108fcec3eb\\FF51.exe\" --AutoStart" FF51.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 83 api.2ip.ua 81 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5092 set thread context of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 1688 set thread context of 3688 1688 E81E.exe 96 PID 4828 set thread context of 4100 4828 FF51.exe 100 PID 4884 set thread context of 1360 4884 FF51.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3edbc9c7553dad54925210b7f9ece36c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3edbc9c7553dad54925210b7f9ece36c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3edbc9c7553dad54925210b7f9ece36c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E81E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E81E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E81E.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 3edbc9c7553dad54925210b7f9ece36c.exe 644 3edbc9c7553dad54925210b7f9ece36c.exe 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found 3428 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 644 3edbc9c7553dad54925210b7f9ece36c.exe 3688 E81E.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found Token: SeShutdownPrivilege 3428 Process not Found Token: SeCreatePagefilePrivilege 3428 Process not Found -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 5092 wrote to memory of 644 5092 3edbc9c7553dad54925210b7f9ece36c.exe 87 PID 3428 wrote to memory of 1688 3428 Process not Found 92 PID 3428 wrote to memory of 1688 3428 Process not Found 92 PID 3428 wrote to memory of 1688 3428 Process not Found 92 PID 3428 wrote to memory of 2364 3428 Process not Found 93 PID 3428 wrote to memory of 2364 3428 Process not Found 93 PID 2364 wrote to memory of 3296 2364 cmd.exe 95 PID 2364 wrote to memory of 3296 2364 cmd.exe 95 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 1688 wrote to memory of 3688 1688 E81E.exe 96 PID 3428 wrote to memory of 4828 3428 Process not Found 99 PID 3428 wrote to memory of 4828 3428 Process not Found 99 PID 3428 wrote to memory of 4828 3428 Process not Found 99 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4828 wrote to memory of 4100 4828 FF51.exe 100 PID 4100 wrote to memory of 4660 4100 FF51.exe 101 PID 4100 wrote to memory of 4660 4100 FF51.exe 101 PID 4100 wrote to memory of 4660 4100 FF51.exe 101 PID 4100 wrote to memory of 4884 4100 FF51.exe 102 PID 4100 wrote to memory of 4884 4100 FF51.exe 102 PID 4100 wrote to memory of 4884 4100 FF51.exe 102 PID 3428 wrote to memory of 3468 3428 Process not Found 104 PID 3428 wrote to memory of 3468 3428 Process not Found 104 PID 3428 wrote to memory of 3468 3428 Process not Found 104 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 PID 4884 wrote to memory of 1360 4884 FF51.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3edbc9c7553dad54925210b7f9ece36c.exe"C:\Users\Admin\AppData\Local\Temp\3edbc9c7553dad54925210b7f9ece36c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3edbc9c7553dad54925210b7f9ece36c.exe"C:\Users\Admin\AppData\Local\Temp\3edbc9c7553dad54925210b7f9ece36c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\E81E.exeC:\Users\Admin\AppData\Local\Temp\E81E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\E81E.exeC:\Users\Admin\AppData\Local\Temp\E81E.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E9A5.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\FF51.exeC:\Users\Admin\AppData\Local\Temp\FF51.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\FF51.exeC:\Users\Admin\AppData\Local\Temp\FF51.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b838bee8-ca3a-4746-a576-61108fcec3eb" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\FF51.exe"C:\Users\Admin\AppData\Local\Temp\FF51.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\FF51.exe"C:\Users\Admin\AppData\Local\Temp\FF51.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:1360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ABC.exeC:\Users\Admin\AppData\Local\Temp\ABC.exe1⤵
- Executes dropped EXE
PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1360 -ip 13601⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\1452.exeC:\Users\Admin\AppData\Local\Temp\1452.exe1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b354abdb8c17beeae07b9418535f4bdc
SHA1cb4fb26e9c00426cf3d1c70f99e72fd36d6c22b9
SHA256f688fb7b4cf19a4760138e7625915815f4acc23732456a3540f76f39aed90417
SHA51221a37e78fff981ba88cab5e92b5c61216af93fc8a44bffdc33a3fcb16875d271790d18d6a0247367594965bae0ee0ee8e56994f02db0df5dbd5179a8dd0d613f
-
Filesize
301KB
MD53edbc9c7553dad54925210b7f9ece36c
SHA157014d3163d27b21075c37d993c14a56cf7208da
SHA256596be482747a9c9fe559196b0a389de92eeeea2b305777c2d1800f9c014c22ce
SHA5122944c936c953478fdc496b90428296080f49f91de136b36c88ef95b330ad8300d560291d7d14b98e168b8f589482e6f4cb0ad08102c2f16721d0d54f7c1773b1
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
810KB
MD5c108826f0555d4e9d6f1fcd7f0b872cd
SHA13f25f209b69a8b95c03292c165e97ca6ed38a102
SHA256b590920e6bd30cbbc602a47a86db121a1d781c98943c8d2e968fa3ad7cfc7cd9
SHA512e9c9944866e878955e69c9520812f3a6cef0f355081c425086be5ae81c9ead9b1847ab9088a30c86ccaea3c704f1e961b05279c9ce29f44d4d5d5ab25979f04f