Analysis

  • max time kernel
    299s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/01/2024, 22:20

General

  • Target

    5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe

  • Size

    867KB

  • MD5

    cc975551f266db95f3ce36928284233f

  • SHA1

    5fcda6c59909bd5238675c3690e15252c301ed5c

  • SHA256

    5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961

  • SHA512

    8c0faeea05ff446c1b2df632a1313a6860c7c64f6e8511a19a8ee00dce8b64ea1c413a25d2feb30dd645a9070a59753d4a22095b0b8bd517771942e51a137651

  • SSDEEP

    24576:rEgLmH/eRWc3wJnEtynDnVOFT9sSJYO7:QGmH/CWnpEtynDnLO7

Malware Config

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdpo

  • offline_id

    Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.5

Botnet

e7447dc405edc4690f5920bdb056364f

C2

https://t.me/bogotatg

https://steamcommunity.com/profiles/76561199621829149

Attributes
  • profile_id_v2

    e7447dc405edc4690f5920bdb056364f

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 11_3) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Detect Vidar Stealer 9 IoCs
  • Detected Djvu ransomware 18 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe
    "C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe
      "C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\60da488e-a433-4046-b9ab-67c8be62a87f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe
        "C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4172
        • C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe
          "C:\Users\Admin\AppData\Local\Temp\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe
            "C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe
              "C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:4440
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1912
                7⤵
                • Program crash
                PID:4228
          • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build3.exe
            "C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3348
            • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build3.exe
              "C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1412
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:692
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
        3⤵
        • Creates scheduled task(s)
        PID:600
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:3752
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      PID:3396
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:4728
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      PID:3368
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:4484
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      2⤵
      • Executes dropped EXE
      PID:1440
  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
    1⤵
    • Executes dropped EXE
    PID:404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          28baf5fd68df59a9964b94cb39ffee77

          SHA1

          b3fddc328582ee68eeb23616393db9abb9e27380

          SHA256

          c5dff2b8854fb9ed981ebdb1d6b621cf681bd1ac18ac44b14c138cd05352365b

          SHA512

          1487962f4c57144dac2278d6a0f04da56f6ba4f03c5467f9df1cc04896fe4fb8bb7286027ae274a95e46e6c0baad836384fe4ee969824efe295d4da2200ebcb7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          724B

          MD5

          8202a1cd02e7d69597995cabbe881a12

          SHA1

          8858d9d934b7aa9330ee73de6c476acf19929ff6

          SHA256

          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

          SHA512

          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          ba40ba89c70e42659cd3df2b6166271b

          SHA1

          b1c9deb2c90a3896b888fc904f6764f005acb381

          SHA256

          16e79dd630b43d54acd6e59dd80c477d8b5ddab75bd4c31d9180b6998c713695

          SHA512

          73eee21d8b4e0854123c44261c3bd2280d95d1ab249c90eb5638769f5cdd42297b3feba783c3efe1b8d295a4bf00ad860757d23b37ffdcd0029fbb8df54181b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          392B

          MD5

          c140f9e5db3a7921188ad8030378e76d

          SHA1

          2b46070634b4c4ea36eb597d4e0886fbda46aa46

          SHA256

          d6e3cb1259cf439ed91142c01d29e58130b0cc88a344eb5759aaf434c35ac82b

          SHA512

          1761333a273aa5a9687d384e575f88d5417764082302881c605d4ab5d3d54e190ce2a9b237ec56f38b4c3fb6d24756d99ae24d5fe1ccf8aa49036971f9a74c21

        • C:\Users\Admin\AppData\Local\60da488e-a433-4046-b9ab-67c8be62a87f\5204ea509328d2ce79d99a88758e45e8757bc9171abfc4577087b456ae9d7961.exe

          Filesize

          153KB

          MD5

          d90f2d6477cabc980ef0e886bd0af0d6

          SHA1

          aa6261db878fcfb7d98f3f33e2da12533d35ed00

          SHA256

          ccf423f48848816fe241a80d550b4aa4644644491d0cb64be0b5f7b6123ecfc4

          SHA512

          3a3a7f65c0c4d4a15d7c58f980116d4a3870a63b852fbe8d2c3fbd18e62e1f247eccda9a207c23fc99f99625453157a0c386d35969f4b035cbaba81e014f380b

        • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe

          Filesize

          253KB

          MD5

          ad184570804fcdeedcee84699f86e91d

          SHA1

          86963ab5f372be2483375e3a9b91b62e6b72fb7e

          SHA256

          548b46557fb39c9fe32881c8b096cda223cbc97aaa8c510c5930f8d9c179ddb7

          SHA512

          01f0dd4251ce0efc4b8ace9f2bdfa4ec6a5bd0003b5be346d8bdcca5170992570d415264103e40feaf25429fa34fda368e1b05736424e09482913b973a1aafb9

        • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe

          Filesize

          64KB

          MD5

          6d0bb5953dcf73e843feee7621bae586

          SHA1

          eb716290067f6f2f748e0b1a7270a2e75b7c1532

          SHA256

          7ee74f0e3f950f154cbddcac719b8501899426e50d4def9ed2c7cc459a4bed91

          SHA512

          0c67f3d4424f9b6b2d98766098fbf16f36388362abf188aab494017ef4448066f11b2b7f5ccd04b81e7097ba3fdde1f3c94029d4994368346bc3c6b5b7624456

        • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build2.exe

          Filesize

          68KB

          MD5

          227105ee6f0755367cb7448774d5d505

          SHA1

          2bb86cde258d04c6eb91a25a1eb4c8bfd2b34c26

          SHA256

          d23c38194fe82f9e1ecb79a3eb9b73dd10f2a84fe411ccfeda6ae97d4e432b47

          SHA512

          7013693cc6486e13ca5defe3551ccbd78f1b24ab6fef24073599156d038bb3e9edbd7c554731e741be4c1ac4acaf1e11043d1973726d71ca1349fc95595325cc

        • C:\Users\Admin\AppData\Local\a41a443d-79f1-4958-9939-82d902e56464\build3.exe

          Filesize

          299KB

          MD5

          41b883a061c95e9b9cb17d4ca50de770

          SHA1

          1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

          SHA256

          fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

          SHA512

          cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

          Filesize

          241KB

          MD5

          e709c27387d407a371fa10cea22da72c

          SHA1

          5012cbef768fe40c70735c05a6de2962e4d23b0e

          SHA256

          166fcef6d16eb35d1252bd7abde55a04074667043253a539928096c93dfe80c7

          SHA512

          3714708b573664586aed4f4a3156756507408ce23fa73ebc6adfc15f5816fe94313c5b7a94eafd3e0558fe8c488c4c83612bf22ec48c8c13a7776ee65592f787

        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

          Filesize

          19KB

          MD5

          c61c82f968b03f1edb0886efcc3c57bf

          SHA1

          41b0480e1e0182da72a848ec9430fb49e0ae3d2e

          SHA256

          0eb48334567323a7f79bcf60b91acb1c507cfc508dcbc501a354df2763e7ed7e

          SHA512

          a8a4bf21477608380432f301a15ac5babeeb676180b6397e9f04a5beaed39789f930c986ab614b9b42f5c1595176f2edf20123124e96c92a9d4db9ad5beaa24f

        • memory/1116-1-0x0000000000790000-0x0000000000831000-memory.dmp

          Filesize

          644KB

        • memory/1116-2-0x0000000002200000-0x000000000231B000-memory.dmp

          Filesize

          1.1MB

        • memory/1412-79-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1412-80-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1412-76-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2268-17-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2268-6-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2268-5-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2268-4-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2268-3-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/3348-75-0x00000000007F0000-0x00000000007F4000-memory.dmp

          Filesize

          16KB

        • memory/3348-74-0x0000000000800000-0x0000000000900000-memory.dmp

          Filesize

          1024KB

        • memory/3752-128-0x00000000009F0000-0x0000000000AF0000-memory.dmp

          Filesize

          1024KB

        • memory/4172-20-0x0000000001FF0000-0x0000000002087000-memory.dmp

          Filesize

          604KB

        • memory/4440-66-0x0000000000400000-0x000000000063F000-memory.dmp

          Filesize

          2.2MB

        • memory/4440-46-0x0000000000400000-0x000000000063F000-memory.dmp

          Filesize

          2.2MB

        • memory/4440-51-0x0000000000400000-0x000000000063F000-memory.dmp

          Filesize

          2.2MB

        • memory/4440-52-0x0000000000400000-0x000000000063F000-memory.dmp

          Filesize

          2.2MB

        • memory/4484-179-0x00000000007F0000-0x00000000008F0000-memory.dmp

          Filesize

          1024KB

        • memory/4728-151-0x00000000009F0000-0x0000000000AF0000-memory.dmp

          Filesize

          1024KB

        • memory/4780-100-0x0000000000800000-0x0000000000900000-memory.dmp

          Filesize

          1024KB

        • memory/4876-62-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-30-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-29-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-24-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-22-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-37-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-36-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-34-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-23-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4876-56-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4980-48-0x00000000005D0000-0x00000000005FC000-memory.dmp

          Filesize

          176KB

        • memory/4980-47-0x0000000000660000-0x0000000000760000-memory.dmp

          Filesize

          1024KB