Resubmissions

14/03/2024, 16:15

240314-tqmebsag25 10

14/03/2024, 15:36

240314-s1w6vafg9t 10

Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 15:36

General

  • Target

    5b9adba171cd2853acc8533c96e1c814.exe

  • Size

    271KB

  • MD5

    5b9adba171cd2853acc8533c96e1c814

  • SHA1

    d415ff5fc9caa6fd4e7e69bc8ea7b42e9c84e7b1

  • SHA256

    6ba1032624069a6bd1ff582c5e83832976fb693dd8814c4ac14e94dbbdf4c00d

  • SHA512

    27f2f2c4670fddcb40364e6373561261a5631353651bc29c72e1bd270c594db084351b8cc25c531fe5097c9ab5fe0c0b3f173a36e3b47901ebf7cd3763074bd5

  • SSDEEP

    3072:s+qUpt6FGAamWyuILne8gQ0LaP9um8JVNhdPWleHO2ImTHrNlokp8ae:sG6oATg8XMkEJvhd+leuFm/K

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .wisz

  • offline_id

    4p0Nzrg1q0ND5of5Gtp2UBjthSXuE8VxnMrd4vt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/a832401adcd58098c699f768ffea4f1720240305114308/7e601a Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0853PsawqS

rsa_pubkey.plain

Extracted

Family

lumma

C2

https://colorfulequalugliess.shop/api

Signatures

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b9adba171cd2853acc8533c96e1c814.exe
    "C:\Users\Admin\AppData\Local\Temp\5b9adba171cd2853acc8533c96e1c814.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1540
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C98A.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:3168
    • C:\Users\Admin\AppData\Local\Temp\286F.exe
      C:\Users\Admin\AppData\Local\Temp\286F.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\286F.exe
        C:\Users\Admin\AppData\Local\Temp\286F.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3388
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\ee142792-651f-4bbd-a600-98ad69c0daab" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:1148
        • C:\Users\Admin\AppData\Local\Temp\286F.exe
          "C:\Users\Admin\AppData\Local\Temp\286F.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:380
          • C:\Users\Admin\AppData\Local\Temp\286F.exe
            "C:\Users\Admin\AppData\Local\Temp\286F.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            PID:4088
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 568
              5⤵
              • Program crash
              PID:1020
    • C:\Users\Admin\AppData\Local\Temp\42BE.exe
      C:\Users\Admin\AppData\Local\Temp\42BE.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:3916
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 1200
            3⤵
            • Program crash
            PID:4068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4088 -ip 4088
        1⤵
          PID:3340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3916 -ip 3916
          1⤵
            PID:4292

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\286F.exe

            Filesize

            736KB

            MD5

            686acf922c225ce9d019e006fd54b4ef

            SHA1

            b04872c5f46bf955421c4ba4c7cf40954e14170c

            SHA256

            ba5224f8d623bd63a67b33fff7aa5cf73dea837e08b81423016b925db5125758

            SHA512

            414b5a07ced21027000c82adff218a41b88c1ad0b19d2e851a3637841d6beda7047fa9e8a81944bed3ccdec6307ded7af0eff474dfa19873c58d033e64707014

          • C:\Users\Admin\AppData\Local\Temp\42BE.exe

            Filesize

            340KB

            MD5

            e79d42e6b51653c6a459adc6e6cd0e7d

            SHA1

            19590e4efcea7b916825669075fb59de0aae0600

            SHA256

            3e1451fbd94c852f561fdb5332a5a8576d940d95b1a8cff4dfc0285bc9fc0b14

            SHA512

            17f70d269b7be8fe4d8fa2b5bca88188c318991ac168d54f37237bbacaf9804e8aa7e6b81a2320bcd61d2a109728461d8082cd69e6b0ed8f1f90600b1ecaed9f

          • C:\Users\Admin\AppData\Local\Temp\C98A.bat

            Filesize

            77B

            MD5

            55cc761bf3429324e5a0095cab002113

            SHA1

            2cc1ef4542a4e92d4158ab3978425d517fafd16d

            SHA256

            d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

            SHA512

            33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

          • memory/380-60-0x0000000002170000-0x000000000220C000-memory.dmp

            Filesize

            624KB

          • memory/1540-2-0x0000000000870000-0x000000000087B000-memory.dmp

            Filesize

            44KB

          • memory/1540-3-0x0000000000400000-0x000000000071E000-memory.dmp

            Filesize

            3.1MB

          • memory/1540-1-0x0000000000AB0000-0x0000000000BB0000-memory.dmp

            Filesize

            1024KB

          • memory/1540-5-0x0000000000400000-0x000000000071E000-memory.dmp

            Filesize

            3.1MB

          • memory/3344-4-0x00000000025C0000-0x00000000025D6000-memory.dmp

            Filesize

            88KB

          • memory/3388-22-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3388-24-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3388-25-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3388-26-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3388-57-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3916-52-0x0000000002D30000-0x0000000002D62000-memory.dmp

            Filesize

            200KB

          • memory/3916-53-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/3916-42-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/3916-47-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/3916-69-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/3916-54-0x0000000002EB0000-0x0000000002EF0000-memory.dmp

            Filesize

            256KB

          • memory/3916-50-0x0000000002D30000-0x0000000002D62000-memory.dmp

            Filesize

            200KB

          • memory/3916-51-0x0000000002D30000-0x0000000002D62000-memory.dmp

            Filesize

            200KB

          • memory/4088-63-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4088-64-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4088-66-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4360-49-0x0000000002D50000-0x0000000004D50000-memory.dmp

            Filesize

            32.0MB

          • memory/4360-32-0x00000000008B0000-0x0000000000906000-memory.dmp

            Filesize

            344KB

          • memory/4360-33-0x0000000073470000-0x0000000073C20000-memory.dmp

            Filesize

            7.7MB

          • memory/4360-48-0x0000000073470000-0x0000000073C20000-memory.dmp

            Filesize

            7.7MB

          • memory/4360-70-0x0000000002D50000-0x0000000004D50000-memory.dmp

            Filesize

            32.0MB

          • memory/4992-21-0x00000000021D0000-0x00000000022EB000-memory.dmp

            Filesize

            1.1MB

          • memory/4992-20-0x0000000002120000-0x00000000021BE000-memory.dmp

            Filesize

            632KB