Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21/12/2023, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231215-en
General
-
Target
file.exe
-
Size
809KB
-
MD5
bd7beb7562fbbb5d6a7773f879389d32
-
SHA1
993ad0a915e475bafb3833b61a36818481dd55aa
-
SHA256
cfb961347c192bd6dfa4e8b86b9a6eb04fca7f29b51b577ffa1465e7a75c733d
-
SHA512
d762255b0cb9095b72f8b4d5821559f2134c6de28e4e7072e78a42870647d9ff1375afc33d7c6b46ba7fff509ab6f4724e4842abf47eb1c1a41e72783dbf38ba
-
SSDEEP
12288:x1lw2NU9n4c7lB5P5ZQwshmMs5OR2aX+975V3BOh6Z5EGyjShHT0q78nDHrJ:x1lwxD7TzZQHmR5OR2aXgrRqj6HTh2
Malware Config
Extracted
djvu
http://zexeq.com/test2/get.php
-
extension
.lomx
-
offline_id
NrqpaQRhQqq5l2tBPp1QS34I3ME2IKsAlZ0A9pt1
- payload_url
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-MhbiRFXgXD Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0839ASdw
Signatures
-
Detected Djvu ransomware 13 IoCs
resource yara_rule behavioral1/memory/1388-7-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1388-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1388-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2208-3-0x0000000000980000-0x0000000000A9B000-memory.dmp family_djvu behavioral1/memory/1388-44-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-71-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-69-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-78-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-77-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-75-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2576-79-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2724 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f1e02331-ca30-411e-8e99-6cbc2b88a90a\\file.exe\" --AutoStart" file.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.2ip.ua 4 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2208 set thread context of 1388 2208 file.exe 28 PID 2252 set thread context of 2576 2252 file.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 file.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1388 file.exe 2576 file.exe 2576 file.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 2208 wrote to memory of 1388 2208 file.exe 28 PID 1388 wrote to memory of 2724 1388 file.exe 29 PID 1388 wrote to memory of 2724 1388 file.exe 29 PID 1388 wrote to memory of 2724 1388 file.exe 29 PID 1388 wrote to memory of 2724 1388 file.exe 29 PID 1388 wrote to memory of 2252 1388 file.exe 30 PID 1388 wrote to memory of 2252 1388 file.exe 30 PID 1388 wrote to memory of 2252 1388 file.exe 30 PID 1388 wrote to memory of 2252 1388 file.exe 30 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31 PID 2252 wrote to memory of 2576 2252 file.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\f1e02331-ca30-411e-8e99-6cbc2b88a90a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d3bc2972a5ce7aa6355ffeff2f781b0c
SHA1aae73ca3a2cd0f7b1dd83f8daa6c80cf24f53486
SHA25630693befccb9a17295ef589e595930adcb2da1013e14a01e45b8fb049b929819
SHA512e1631a141b890432f882e02683cdbe4b60a1cc4d60a2461a6aa658fca949c33080bb04c88ab1912bef66b54b54086807f9373b66e6b1ca4d96a0c341cd6972d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
28KB
MD59c94dfd9c6567fff16baaa77d169a03a
SHA118ee0ee38724bdb41ab7802ca1b6c421ba6993cf
SHA256f60e248a8826243fecb023764bdebb1861b9647a9874f7a35bdffa9c41a21367
SHA512873f0333ac8e9195cd95a536da6cfc46c2cae03ad4e10720244056458a1c4b493c489ed3047b6804d5326ce3b9944094f9e9aa090b396f918046d023e9c1594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b68f97c9116cda6537f4fcfec1606005
SHA150cdfb0f767f30a64c72619d3c23b99fbf0380b2
SHA256615d7c3c56cd3b39369797fde3e1690b84d56633a62b6447d198df3c0b551b73
SHA5127009914a4ac526f3125326abcd6ae7b149281486671b6ae3f8cdec2a68ac83b88376acf115f3dad6d1a32035f3f142ae964dcc4239ac3399fadf05f892408ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b8567a32ed5fb92b5e2597eb152d17
SHA1737318005d4c64b982c63a05fbf26479d686d3d4
SHA25643a96c79925466d13da7ba7bdf90b3c5a20cfd773d1148f0829813c655ac9c54
SHA5127b6bea69e8e8cb80668d2891b290d107d8ae7155b0d5672d47753ed7176758f8b1da6a226082b9a92f65e5c762c5a08492ae71a2b451f49ac562ce054def7f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5cfabfecda763cc85b231d37e44a3eae5
SHA146f93bca5bca613f5791972dabe408623ebd9620
SHA2567786d25171ba79a9f3ab14186630737664a918f04bd24167c54da7a84e9f0b38
SHA5120ed4b82dff948700aa7816911181ad525dea5f7d180846551da65807f1a9ff38349e64af38d47cce2887b05e7a001f2ce1e80c1a9620f70b99d3c459d2ed9127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD574741e05b3cfef6946101895a1c5b510
SHA132df5848bab1a33151411912e84750605b0cb21b
SHA25685bab78a0416678be52ef8b6dd884b6ae94880189fc9a519500bf2833d7441f0
SHA512baa790c29de972062a595e8e229f22ae218da701ccaa343c9c1efbfb6a3cc681e0fc907389888791d79b5e5b3b3a5bf01617ebe61f2f61e6c013b39d323e7761
-
Filesize
93KB
MD5bcf0ab1067aafba1eab45a36184260bb
SHA142d79af5b261733c68020fcae7bae50288c63e89
SHA256c7de68c2d9b584876fe5d653ffe588ff75b46344c027f5a412a000d940bc02c4
SHA5123527c80d9379be054db804a1274b3b1d6cea71d9f5c1d9067b52b7149dd1692c08851868ab427f86e679b5c3753cf1a50a31999fc2eebe941a1f2cf04bc2f8ed
-
Filesize
184KB
MD5722473ba7bd3267ba52823ccaf084884
SHA1c94d8a7db623d5c8e70e8afca0de222e6ef78a9a
SHA25679c5bd6ebc5d5691f5752f83e4f972d25004dd217737d0ce71da2439b1a7b32c
SHA512fef4cdaf57664320a5baa61578144326cb0118e0dc50d675292fbd3423c873395960fec5ae5cf4fb072c8a42205b86e3944d79eb48ebc6156653dd7760036c60