Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2024 05:08

General

  • Target

    97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe

  • Size

    774KB

  • MD5

    faf9bf89fd060a85d2fcc98e9d511a8b

  • SHA1

    08d256665c3aa89eafa123cfb965c8c1b4b5f5d0

  • SHA256

    97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98

  • SHA512

    318bb22a79f511421f209f0ee1a8367addfa4c7355f4000bce80b2d18beab450d927c2910eb3f4f2e6f7b5924c623f531eb9c46c80e11123298af721054c4ba1

  • SSDEEP

    12288:liIAA+MX6Cy84Yw54I1/MASK0k1sLYslK0ijkbHi/58P8agY56MJUG2:lpBU8nwN1/MASK0xLYHjAtP8aouUG

Malware Config

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Detect binaries embedding considerable number of MFA browser extension IDs. 1 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 2 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
    "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
      "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\d87cbcb5-08ac-469d-a44b-59aa91cca1db" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1468
      • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
        "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
          "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
            "C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1752
            • C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
              "C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 1444
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2896
          • C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build3.exe
            "C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build3.exe
              "C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                7⤵
                • Creates scheduled task(s)
                PID:3040
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {15E1A5A4-B44C-4664-80FA-146C24B87BC9} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]
    1⤵
      PID:3016
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1580
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2824
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1752

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    File and Directory Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      c59708a86e78530488f2356251e775a2

      SHA1

      17e33e077261cdd9e54d4e58dfb168f15ee93efb

      SHA256

      71719971666e64a4f767e8f9d0b52e822189c4bfb1fe449a0e7c8066c82813c2

      SHA512

      42afd4d2c791ea8cb239130cf4f4d43da0ec39c63049c56796e082282e2ba2f0cd0fd8934b7de3b359ca433b0609ad159fda6f92168168f2d4517f13fbbb3fbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      0f630b1667b6de9c1d9aff826f89e0a5

      SHA1

      f4cd5a59d2704584c10dfe77c4dbc41cf50a338c

      SHA256

      a37e2a6f25b4e1e38c6515473e63980ac6425720f5997aa3f32407cab2a6bb05

      SHA512

      0620ff2adccf11a8e7dd478000316549f67fb25dc6f8d1002ca22fd66b60810c38e39e3df795b3de0a0e8713f2313010aa8b5368e6d864f530b81dfbde652e6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      820bf94af25533a8d40f624d762df30f

      SHA1

      3d17ab59dde8f467b82ca34e047a4568ad88ba1b

      SHA256

      feac1989d50dc72b9f39649c1fd27500b7b24fca286f546fc308a25a31588e84

      SHA512

      99b77be5875e86f69323027ab3446a5b67b6490f315aef6541e9becf1c84aad6ad0af4190ccee470d3618bdf666216b361a6c8cf39b9fea1e9f847b6be60bdfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      60115761bc596d8dbc9a83990e452505

      SHA1

      700edb3cde819764f98786c8811038701176ed07

      SHA256

      0b2509446ce7b9ffa9de2599a55aaf92f7d4ee68ceef9a3cb954010d5108f70f

      SHA512

      16f052e7aafa6c1b4167150848e620658d6d3c1a17a1c83043db631be8555c2562657c70fa1446eec9b95402864d8fa873cae4f190694ebe6de11646ca553948

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      61e24dc6a1ad11b7128bed854a62b385

      SHA1

      2ad0602a9862753136308b6289b34c2ccc3d70d2

      SHA256

      5f21a963c201adf6f162e3257009ec2391b58453d92c9256a5053c7441f8aa0f

      SHA512

      441082fac509ac7fcf3ede0d9d9f640eb9c7e7ddc40c0641b05a937e16e6fdc5249c6f49c999bd1ce4afcaf2b61819bdf2246182f1e7e10aaee2079cc3376543

    • C:\Users\Admin\AppData\Local\Temp\Tar2656.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\d87cbcb5-08ac-469d-a44b-59aa91cca1db\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
      Filesize

      541KB

      MD5

      d00a2fa8b6a76cecada37c72339122ca

      SHA1

      d726eaf5b5940a0d7ccb3a44247dfc4ae41c7444

      SHA256

      599483a8cd73836dff7ec348d155d1ae0a5c31719c3829f5a952086903fa7a19

      SHA512

      78d76e99ad0c6fcb46e25d4061563afdbb444572f53d9a502d581fb6b487a08d04983636161c7cbeca1385f958e718ba9f379afd65d852aff540aaff0a1ec6c0

    • C:\Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build3.exe
      Filesize

      299KB

      MD5

      41b883a061c95e9b9cb17d4ca50de770

      SHA1

      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

      SHA256

      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

      SHA512

      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

    • \Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
      Filesize

      359KB

      MD5

      ac8e9957c0f4bc7c7851e9e3a3dfe8d8

      SHA1

      4f15e38b3b09db6e590e3ae082963e96d370d937

      SHA256

      557666be88a3eb541b093aa7bc05e721d01d788ee648d7044e41993554c79766

      SHA512

      9df47982d7b4973a05328158c57fe9c5937062a202437731280e97205782ed93fb66ad8f100cd47b048492fb38131caf67ec2977c1ee9c9251dd711eaaf08cfe

    • \Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
      Filesize

      363KB

      MD5

      82a7cbfa4986a4a12c03df54c491b29f

      SHA1

      8d1625b338ec5054d1aaa874e64229410a0ab002

      SHA256

      47784b2af8baa0625368a302eaeada21079a0b7a00f840ea21fd633113e43941

      SHA512

      0af141a22793d670f01894f5a496fca447d3783b9214053429b668959420bb5e2febfbfa0c30f29f6c9014a2ddc8a5ab1d755ab5d0bdddc538ec6a86e612093f

    • \Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
      Filesize

      175KB

      MD5

      8c596bfa4a9df07952a9715c52423200

      SHA1

      3c74e20598d951abb4ce0fa4a3ee65bc45dd5312

      SHA256

      08a1d8e5ae6bf13942934cc1fd763f5c7714d4d1c6f24eb1a8144fdcd0b1730c

      SHA512

      e807c521487d291a9a7f7d5fd08cac47475b7aa27c853c2f1f1f13f9ed9c1a1a68b3d8a0aedc212ad20f5ceb87976eb6ecd7309321f07bc98574a29b2a609707

    • \Users\Admin\AppData\Local\e3fef690-8dcc-46ec-bb07-eb9585acb56d\build2.exe
      Filesize

      385KB

      MD5

      63e4a9cd7a8b37335b5f18cefc5dd9d2

      SHA1

      c781a30935afc452b108cc78724b60f389b78874

      SHA256

      c1e75efde3fd1da605135e5c3ffab0073299c80632d136f8eeba9d4a7c98c70f

      SHA512

      3818b5966938704c5830acb5426db7791f6ae476853248d8984b1aff35a6722a0684bea54a53ef6ded1f301f6de9ed044d45f007457a9c0f3a7ea3afc7bf0ecc

    • memory/1580-278-0x0000000000970000-0x0000000000A70000-memory.dmp
      Filesize

      1024KB

    • memory/1752-87-0x0000000000280000-0x0000000000380000-memory.dmp
      Filesize

      1024KB

    • memory/1752-89-0x0000000000470000-0x00000000004A0000-memory.dmp
      Filesize

      192KB

    • memory/1920-251-0x00000000001B0000-0x00000000001B4000-memory.dmp
      Filesize

      16KB

    • memory/1920-250-0x00000000002D0000-0x00000000003D0000-memory.dmp
      Filesize

      1024KB

    • memory/2180-44-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2180-7-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2180-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2180-5-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2180-8-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2356-2-0x00000000002C0000-0x0000000000352000-memory.dmp
      Filesize

      584KB

    • memory/2356-0-0x00000000002C0000-0x0000000000352000-memory.dmp
      Filesize

      584KB

    • memory/2356-4-0x00000000004D0000-0x00000000005EB000-memory.dmp
      Filesize

      1.1MB

    • memory/2444-54-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-71-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-53-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-245-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-70-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-168-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-167-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-165-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-223-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2444-72-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2556-47-0x0000000000220000-0x00000000002B2000-memory.dmp
      Filesize

      584KB

    • memory/2556-52-0x0000000000220000-0x00000000002B2000-memory.dmp
      Filesize

      584KB

    • memory/2556-46-0x0000000000220000-0x00000000002B2000-memory.dmp
      Filesize

      584KB

    • memory/2636-257-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2636-256-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2636-253-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2636-249-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2780-86-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2780-94-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2780-231-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2780-93-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2780-90-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB