Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/12/2023, 18:24

231224-w112ksffdr 10

24/12/2023, 18:21

231224-wzcycsfchm 10

07/11/2023, 17:16

231107-vs31jadh73 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 18:24

General

  • Target

    95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe

  • Size

    765KB

  • MD5

    52f22c2a5b2c339e75f176bf5bfcb3f3

  • SHA1

    0a3b96aa59d5eda04c731bfb9c2ba7fef997d1b9

  • SHA256

    95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4

  • SHA512

    ec5f24367c46ff558110022ad8e1106fe5d1d9b9f94cf423b0cd1e1cd7d5ee3111e16cc12ccf3d6e65c5a5d5358691726172e33fb6338e1b7291be9566766da8

  • SSDEEP

    12288:mokzmesNcOJCG4jm2E2SLZJsiXlg8XGB2P3yo1jaUPC4t56ha6DJof5:izk/QDo2SVJsylBXjVNPyvu

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/test1/get.php

Attributes
  • extension

    .jzeq

  • offline_id

    4FMaMDK6uqPZOxJj64677pqiSGF54A1Dam9zfUt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-TAbs6oTGSU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0821ASdw

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
    C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY5
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
      C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY5
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\cfa2fc67-81f3-4a67-aab0-5bdd1a553ec8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
        "C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
          "C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4600
          • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe
            "C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe
              "C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1208
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:2936
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1032
  • C:\Windows\SysWOW64\schtasks.exe
    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
    1⤵
    • Creates scheduled task(s)
    PID:548
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    ad1b831e6b39763c118dd6bf34d8641a

    SHA1

    43e23a3d91315736f59751521ade3224f45ece86

    SHA256

    fe673f5da906667a2f5b08f086d292da711c854fce0268f8e4ed7d4d6e62d58a

    SHA512

    cabe0d43a8bc792b9725af5bdb918a7edfe4e7542771cceb57d8686fab0c2c1a5201346f8e960ee31cfa46c1c291d59bcee04b867ff43dfea2520066c8da3fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    5bcca03cb05d354114bfe68e75761db9

    SHA1

    f6f4586f76c4a241fc2924f906be76de66ec7bcd

    SHA256

    bb641aca3282970ce3ffa3acaffb2139a8fd3da4320c36e70195982728cef105

    SHA512

    db6d2493c4d7a66969ca00714eaf71e7f5c761cd650c4c3ee22917718c9ec4f65c6f7cbae30deac54137cb34f4a57bf93887d587410be19c027f315b3b1e224f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    ee514d9189e258993932e1347736a415

    SHA1

    d07ab3b78df16d8250c29886d7e85b5de753595a

    SHA256

    47553d903e924fc873f7bc09cb7336c0003a3eee2e0315d1d20eb097b21905ce

    SHA512

    0421db76a1da0e45942cff68f328d727f91730515619ac8ef2d011378d90e4292c4d21eb8bc21d950b70f30901a71be7a7a17c238bd980522d6b91e18a4f0044

  • C:\Users\Admin\AppData\Local\cfa2fc67-81f3-4a67-aab0-5bdd1a553ec8\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe

    Filesize

    110KB

    MD5

    047b48def33f10ceb9525cdeb6aa5aeb

    SHA1

    cb1ad038da9cc5ea70eae30f3d096cbacbcb981c

    SHA256

    c7404fe7d2295f311f1a7d10611e4c7d2ab9c663e2959f36923050ebcb435a64

    SHA512

    3c0cfb980c8d6ff286ae1dd8ab48a735d0bf9d7817756145c3e4a2675fa259c0d2514e407bdd1fce6dcd85390558e5e4203df636d4e5f99cc7127d8669af80d6

  • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe

    Filesize

    111KB

    MD5

    e785717a3ed505b6600a31fab12469b3

    SHA1

    69457d7fd68c01003803eaf5c0e04ab375372852

    SHA256

    5a71000177f8c78799dc5d92ed35faf3b658a95efc7340cff97ac5fe7e44ef00

    SHA512

    4ffcd4e5671e8cf2ba4c475f10d8ebbe8cdeac44145d4f03ff3f53ce7d00c3e438ce81d435e0464fe3c6275703cffdae20341d81878165a791b273ed83e2d5c8

  • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe

    Filesize

    152KB

    MD5

    60e718c8b9c32ee2fc6ba312bbcb27bc

    SHA1

    91b7ac2c63b5eed829ed71ba7957b83c86c5860e

    SHA256

    5f8b772cbdc607d425a661b192016dce588af3b9600907a5527661a3d05603d4

    SHA512

    5da45c5c6a9b5a98099594296aeb58bd6f3efade32dad88dbb8f72cf500cedfe9a7060f0492cf48b8fae3c653208c15558a89f511007819694a7bb3f02e03a08

  • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe

    Filesize

    99KB

    MD5

    ef06ac5172fc65adda5c64edc8be0b94

    SHA1

    ee330bdab978fd33a30f2933be867af38c6fa083

    SHA256

    1f0ceb4cb5312630eedf4325cf4a883ed67c5717b615be8d39d49130f55878fb

    SHA512

    297bee1a185a2c30a7e97372b3de88163a24516cc234c6f3d07ec5cd31cefd98e78bcdcacc4e00946c31e0878570c1fab7e994f8836724c97a9353ee5cdcb219

  • C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe

    Filesize

    150KB

    MD5

    e82bf5efeb233752669694a43574c882

    SHA1

    90a41db7921f072d3e649daa6695fc1cc7a2b01f

    SHA256

    18a88c0cc9f2c650908f88f3872472e915cb03433b80ac24d38d7595ef24381a

    SHA512

    d0772e8e94fcb738edec78fcfc4b5e196065bbca3510d83d7328715e3293bca551076c7e3dce2fe44db10edbd8e1b1441124da73e2f30fd88201d11e500bf022

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    193KB

    MD5

    1f38596db3dd52265b5b215c43e08f33

    SHA1

    c80f76ad68c647fda6dc9b6c786ec395b4166481

    SHA256

    f165e1e460272fa6a96942d07ccb17ecf09d18e0d96db4b4f20aca890285c878

    SHA512

    5262c50fc3d796e27ccb8ce1eac4dd7a5e08921a6ce6805627d4a380ba18c5554a317d0270f4226f1b9b7ba3c5835298e69c46082fc8b9bd13de217f4c552f63

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    260KB

    MD5

    d946a2510c611d97b6834b9d26039edd

    SHA1

    21af04d653156d59c5e97ff37a689e6dcaa963bd

    SHA256

    8c9a7607101956762353683de56bd62bc0a08b0a303c3058ea03b8ab504d128a

    SHA512

    ebe4969a6bb4fc53b16177aaa43262933378e3a3bc0e2756d3a4c5709bae5c8ad08d9c19a27d6994f5a475fcb8da4df1dc8eb18e0b735c2fc7c9a45ae30b920d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    154KB

    MD5

    9546239b2645ea9075c26110c0fc6e0e

    SHA1

    d9fa054c16467c67e8237f8734881bc40363c5e8

    SHA256

    699a256c566b27e0c1b020d0d50f60eebd5a7246d5948990542f98cfe22aebda

    SHA512

    14ddfb8da7bcf2f1a0631d8e550b5cdc79e425bc4f2e20fade6823af797181a2e0ff9a011d24ac74d96389e0a63f767b2cba66ab2335f4fba7fecbd6506ae952

  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

    Filesize

    149KB

    MD5

    7abba8174677b3c4d585cd620e6f0c6b

    SHA1

    2de166d22c395e3d8fddc964b145a10f14653e5b

    SHA256

    5b32fbd2dde8751cc9db1e650703b8054f864b344f20bce83ecb79b9a77342a1

    SHA512

    8bac1c3c3ee0bb25870d1b288cd5d563294795681b0942a4b89182214b48ab8ece50d445f9faac0d4776e7395567b5ca867e1008e49d6e147e7e904682ae8d18

  • memory/824-76-0x0000000000B60000-0x0000000000C60000-memory.dmp

    Filesize

    1024KB

  • memory/1208-55-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1208-65-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1208-62-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1208-61-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1208-64-0x0000000000410000-0x00000000004D9000-memory.dmp

    Filesize

    804KB

  • memory/1420-6-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1420-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1420-3-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1420-4-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1420-15-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1636-18-0x0000000000A90000-0x0000000000B27000-memory.dmp

    Filesize

    604KB

  • memory/3068-1-0x0000000002610000-0x00000000026A4000-memory.dmp

    Filesize

    592KB

  • memory/3068-2-0x00000000026B0000-0x00000000027CB000-memory.dmp

    Filesize

    1.1MB

  • memory/3832-60-0x0000000000A50000-0x0000000000A54000-memory.dmp

    Filesize

    16KB

  • memory/3832-58-0x0000000000AAD000-0x0000000000ABD000-memory.dmp

    Filesize

    64KB

  • memory/4600-21-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-51-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-48-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-32-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-35-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-34-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-27-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-28-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-20-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4600-22-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB