Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2023, 15:48

General

  • Target

    file.exe

  • Size

    809KB

  • MD5

    bd7beb7562fbbb5d6a7773f879389d32

  • SHA1

    993ad0a915e475bafb3833b61a36818481dd55aa

  • SHA256

    cfb961347c192bd6dfa4e8b86b9a6eb04fca7f29b51b577ffa1465e7a75c733d

  • SHA512

    d762255b0cb9095b72f8b4d5821559f2134c6de28e4e7072e78a42870647d9ff1375afc33d7c6b46ba7fff509ab6f4724e4842abf47eb1c1a41e72783dbf38ba

  • SSDEEP

    12288:x1lw2NU9n4c7lB5P5ZQwshmMs5OR2aX+975V3BOh6Z5EGyjShHT0q78nDHrJ:x1lwxD7TzZQHmR5OR2aXgrRqj6HTh2

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test2/get.php

Attributes
  • extension

    .lomx

  • offline_id

    NrqpaQRhQqq5l2tBPp1QS34I3ME2IKsAlZ0A9pt1

  • payload_url

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-MhbiRFXgXD Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0839ASdw

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\f1e02331-ca30-411e-8e99-6cbc2b88a90a" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Users\Admin\AppData\Local\Temp\file.exe
          "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    d3bc2972a5ce7aa6355ffeff2f781b0c

    SHA1

    aae73ca3a2cd0f7b1dd83f8daa6c80cf24f53486

    SHA256

    30693befccb9a17295ef589e595930adcb2da1013e14a01e45b8fb049b929819

    SHA512

    e1631a141b890432f882e02683cdbe4b60a1cc4d60a2461a6aa658fca949c33080bb04c88ab1912bef66b54b54086807f9373b66e6b1ca4d96a0c341cd6972d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    28KB

    MD5

    9c94dfd9c6567fff16baaa77d169a03a

    SHA1

    18ee0ee38724bdb41ab7802ca1b6c421ba6993cf

    SHA256

    f60e248a8826243fecb023764bdebb1861b9647a9874f7a35bdffa9c41a21367

    SHA512

    873f0333ac8e9195cd95a536da6cfc46c2cae03ad4e10720244056458a1c4b493c489ed3047b6804d5326ce3b9944094f9e9aa090b396f918046d023e9c1594c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    b68f97c9116cda6537f4fcfec1606005

    SHA1

    50cdfb0f767f30a64c72619d3c23b99fbf0380b2

    SHA256

    615d7c3c56cd3b39369797fde3e1690b84d56633a62b6447d198df3c0b551b73

    SHA512

    7009914a4ac526f3125326abcd6ae7b149281486671b6ae3f8cdec2a68ac83b88376acf115f3dad6d1a32035f3f142ae964dcc4239ac3399fadf05f892408ced

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12b8567a32ed5fb92b5e2597eb152d17

    SHA1

    737318005d4c64b982c63a05fbf26479d686d3d4

    SHA256

    43a96c79925466d13da7ba7bdf90b3c5a20cfd773d1148f0829813c655ac9c54

    SHA512

    7b6bea69e8e8cb80668d2891b290d107d8ae7155b0d5672d47753ed7176758f8b1da6a226082b9a92f65e5c762c5a08492ae71a2b451f49ac562ce054def7f23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    cfabfecda763cc85b231d37e44a3eae5

    SHA1

    46f93bca5bca613f5791972dabe408623ebd9620

    SHA256

    7786d25171ba79a9f3ab14186630737664a918f04bd24167c54da7a84e9f0b38

    SHA512

    0ed4b82dff948700aa7816911181ad525dea5f7d180846551da65807f1a9ff38349e64af38d47cce2887b05e7a001f2ce1e80c1a9620f70b99d3c459d2ed9127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    74741e05b3cfef6946101895a1c5b510

    SHA1

    32df5848bab1a33151411912e84750605b0cb21b

    SHA256

    85bab78a0416678be52ef8b6dd884b6ae94880189fc9a519500bf2833d7441f0

    SHA512

    baa790c29de972062a595e8e229f22ae218da701ccaa343c9c1efbfb6a3cc681e0fc907389888791d79b5e5b3b3a5bf01617ebe61f2f61e6c013b39d323e7761

  • C:\Users\Admin\AppData\Local\Temp\TarF6D.tmp

    Filesize

    93KB

    MD5

    bcf0ab1067aafba1eab45a36184260bb

    SHA1

    42d79af5b261733c68020fcae7bae50288c63e89

    SHA256

    c7de68c2d9b584876fe5d653ffe588ff75b46344c027f5a412a000d940bc02c4

    SHA512

    3527c80d9379be054db804a1274b3b1d6cea71d9f5c1d9067b52b7149dd1692c08851868ab427f86e679b5c3753cf1a50a31999fc2eebe941a1f2cf04bc2f8ed

  • C:\Users\Admin\AppData\Local\f1e02331-ca30-411e-8e99-6cbc2b88a90a\file.exe

    Filesize

    184KB

    MD5

    722473ba7bd3267ba52823ccaf084884

    SHA1

    c94d8a7db623d5c8e70e8afca0de222e6ef78a9a

    SHA256

    79c5bd6ebc5d5691f5752f83e4f972d25004dd217737d0ce71da2439b1a7b32c

    SHA512

    fef4cdaf57664320a5baa61578144326cb0118e0dc50d675292fbd3423c873395960fec5ae5cf4fb072c8a42205b86e3944d79eb48ebc6156653dd7760036c60

  • memory/1388-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1388-8-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1388-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1388-44-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1388-7-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2208-0-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/2208-1-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/2208-3-0x0000000000980000-0x0000000000A9B000-memory.dmp

    Filesize

    1.1MB

  • memory/2252-46-0x0000000000980000-0x0000000000A11000-memory.dmp

    Filesize

    580KB

  • memory/2252-50-0x0000000000980000-0x0000000000A11000-memory.dmp

    Filesize

    580KB

  • memory/2576-52-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-53-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-71-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-69-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-78-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-77-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-75-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2576-79-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB