Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
toolspub2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
toolspub2.exe
Resource
win10v2004-20231215-en
General
-
Target
toolspub2.exe
-
Size
255KB
-
MD5
981b36d1cfeefa91f3ef5332922cdd8d
-
SHA1
b8a6b27e011a503755c6df2501039edb82b092aa
-
SHA256
461f0f86f52bfa5fbed84023d0a9c8652bcbca34fea76ad0cb5bb8c503b65c9a
-
SHA512
e0932850586027a24b8d8d7a3fbbaf4fc466a89cc4382ca1fb31847b5c201df3855f31e7208c577cc7907e5af0792abff0092941774cf3b4a27256440ba0d7c2
-
SSDEEP
3072:2lrJL/wx7/zm4XobcY66bIjWMHGZ4jnz2fbqbzx5h+4Wy601:23L/wxf9Y6mIjN/nmI+4W1
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral2/memory/5108-26-0x0000000002710000-0x000000000282B000-memory.dmp family_djvu behavioral2/memory/4100-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-31-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4100-43-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3428-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3428-50-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3428-49-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation B38.exe -
Deletes itself 1 IoCs
pid Process 3400 Process not Found -
Executes dropped EXE 6 IoCs
pid Process 5108 B38.exe 4100 B38.exe 1308 B38.exe 3428 B38.exe 2504 3542.exe 3860 40EB.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4436 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c9142965-5ae8-48ac-9435-7fc1040e9f2b\\B38.exe\" --AutoStart" B38.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 api.2ip.ua 78 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5108 set thread context of 4100 5108 B38.exe 107 PID 1308 set thread context of 3428 1308 B38.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5064 3040 WerFault.exe 19 3724 3428 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 toolspub2.exe 3040 toolspub2.exe 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found 3400 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3040 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found Token: SeShutdownPrivilege 3400 Process not Found Token: SeCreatePagefilePrivilege 3400 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3400 Process not Found -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1732 3400 Process not Found 102 PID 3400 wrote to memory of 1732 3400 Process not Found 102 PID 1732 wrote to memory of 3512 1732 cmd.exe 101 PID 1732 wrote to memory of 3512 1732 cmd.exe 101 PID 3400 wrote to memory of 3616 3400 Process not Found 105 PID 3400 wrote to memory of 3616 3400 Process not Found 105 PID 3616 wrote to memory of 4404 3616 cmd.exe 104 PID 3616 wrote to memory of 4404 3616 cmd.exe 104 PID 3400 wrote to memory of 5108 3400 Process not Found 106 PID 3400 wrote to memory of 5108 3400 Process not Found 106 PID 3400 wrote to memory of 5108 3400 Process not Found 106 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 5108 wrote to memory of 4100 5108 B38.exe 107 PID 4100 wrote to memory of 4436 4100 B38.exe 108 PID 4100 wrote to memory of 4436 4100 B38.exe 108 PID 4100 wrote to memory of 4436 4100 B38.exe 108 PID 4100 wrote to memory of 1308 4100 B38.exe 109 PID 4100 wrote to memory of 1308 4100 B38.exe 109 PID 4100 wrote to memory of 1308 4100 B38.exe 109 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 1308 wrote to memory of 3428 1308 B38.exe 113 PID 3400 wrote to memory of 2504 3400 Process not Found 114 PID 3400 wrote to memory of 2504 3400 Process not Found 114 PID 3400 wrote to memory of 2504 3400 Process not Found 114 PID 3400 wrote to memory of 3860 3400 Process not Found 115 PID 3400 wrote to memory of 3860 3400 Process not Found 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 3682⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3040 -ip 30401⤵PID:1312
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 11⤵PID:3512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D188.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:1732
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 11⤵PID:4404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D571.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3616
-
C:\Users\Admin\AppData\Local\Temp\B38.exeC:\Users\Admin\AppData\Local\Temp\B38.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\B38.exeC:\Users\Admin\AppData\Local\Temp\B38.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c9142965-5ae8-48ac-9435-7fc1040e9f2b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\B38.exe"C:\Users\Admin\AppData\Local\Temp\B38.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\B38.exe"C:\Users\Admin\AppData\Local\Temp\B38.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:3428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3428 -ip 34281⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 5681⤵
- Program crash
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\3542.exeC:\Users\Admin\AppData\Local\Temp\3542.exe1⤵
- Executes dropped EXE
PID:2504
-
C:\Users\Admin\AppData\Local\Temp\40EB.exeC:\Users\Admin\AppData\Local\Temp\40EB.exe1⤵
- Executes dropped EXE
PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD52fbe0438e264ec1d6c19e0a80daa02d7
SHA1f25dd81b7804a7772c7c2364919562641205bd85
SHA2569af6a9f2baba974a008ecca33ccd921b577ba580e31c5cabc925d057b2b13a3f
SHA5129ff37dfab475ee17ac48f007096ef07e854e203d728bd9d5a1fe60e995cf937c71d5c64c1984036bad6888531ab1c5910aad0d2f62f962485e3eee3a28c9173c
-
Filesize
2.7MB
MD5a5adb2a52fa4739006eec322ef30f807
SHA1557edbff7269d205be371abbcc43578e07f3fb36
SHA25685985fa67e579f675990af51cd3dd8c4fcbd7062669e94ae43ab23b70c34fd3f
SHA5126874f31d60fb608a136818a8109100a1600663af2d71a6796e5828b5f975da4aee4834d756ddf6a3773e1ee25b47c19867898964955509cf51af8652980c242f
-
Filesize
418KB
MD59429434d4229204bcd3f5a9e65997d06
SHA1b4e26270cf8cfd0ffc69cea8385e5be41afa6049
SHA256b427236a1befbe2fc63916f2bbf0076fc667f92dd4ca715a3d922f25bbef9139
SHA5128ce466189b287730510177586651d70e34212e01eaaa6b58e2dba601445cf26d9e8d2dcc1c9c9461b4da2204da6cc18bea9a52f3b3d966038f5024474050d7c0
-
Filesize
403KB
MD5593e6312a6aca7189df24a49ab7ad120
SHA13b4daf49c00d3a2275d01498b77bf600e1a73953
SHA256142960c6f3973bc7722d8523be002a592e8736e893e865d5ffc97dc133172ecc
SHA5123ae0cb5ab2cab69c524da6c433952634c0375a8fa39b74bd869f39220dfa562019ee66d5dc868d3cdd0409925e0bc49b8501be0ca0fac0a5281e51d639edd100
-
Filesize
754KB
MD50d7b0e8e6222fa5bfb54ecc36281308a
SHA1d2b2a8a310538be0d6680640a965cbc626b8d675
SHA25624a4f148d10a2fa9eb0ea7c47184f1a9f0a07139bd5d30e4622e4ea1ca6d60a6
SHA512a573c4af5051b38aff5cdbae1f5b26fba2175d4335a174e14657c1a835ca81491d948abfa9e49248e805b6365ec706e51fe544ddd47d92ae54ee5d2aaf9f2a17
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155