Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 21:21

General

  • Target

    3b9e9e130d52fe95c8be82aa4b8feb74.exe

  • Size

    811KB

  • MD5

    3b9e9e130d52fe95c8be82aa4b8feb74

  • SHA1

    1cad525ecc17fb320bd8256e9cd106b989f97354

  • SHA256

    caeecccfee0962fbe3d4fb4ab336bf3d1230b12ad0821ff66f7a2cabc289c954

  • SHA512

    bb360a72f52fcb1a26a8e94ab31c74092cbc8f2a2c12756f4f2b2c81a7d96bbdf440b0daad26fbd2593371794061bf0372989dc845333ff882f782280b609e25

  • SSDEEP

    12288:k4s2A/R5gv2bJ4GECR556Y9JlObra93zWsiQJjXEymLAhYz9lw/WH4+6mHtAF:Ev/Re2qWZfnobU3as37Qz9lU+ru

Malware Config

Extracted

Family

djvu

C2

http://sajdfue.com/test2/get.php

Attributes
  • extension

    .looy

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0858PsawqS

rsa_pubkey.plain

Extracted

Family

vidar

Version

8.4

Botnet

95002d0a9d65ffced363a8f35f42a529

C2

https://steamcommunity.com/profiles/76561199654112719

https://t.me/r2d0s

Attributes
  • profile_id_v2

    95002d0a9d65ffced363a8f35f42a529

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe
    "C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe
      "C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\8b5a767d-e5d0-4d9c-b744-8181876a3fa5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2672
      • C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe
        "C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe
          "C:\Users\Admin\AppData\Local\Temp\3b9e9e130d52fe95c8be82aa4b8feb74.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe
            "C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe
              "C:\Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe"
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1440
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          56d79b1038102a5d57d2d6b86dadfcd3

          SHA1

          ec07c37245db9432a81ddbb7a3cb492c04d9a20d

          SHA256

          0690e09d1fd988e1b9cf868ff5537e0a595afe675918238f485302cdb453028b

          SHA512

          8e3d6bca43a569eb651f4cf2e1424956a963a91a760cdb4bd6185bd14c753c1726aeed1fa37c5ef2d302ce804249505e71313fab1b175d603306b56a3ac7e3f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          724B

          MD5

          8202a1cd02e7d69597995cabbe881a12

          SHA1

          8858d9d934b7aa9330ee73de6c476acf19929ff6

          SHA256

          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

          SHA512

          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          8c34362373c3162ab3478ebe31d22165

          SHA1

          afe3821a1048787c46059549d85b8381ae96b699

          SHA256

          92f09e0c76cb11c2949e84e5b40e3d30e914ee9f8f7291b4d6f8c42342769a49

          SHA512

          74129b1a723bba0c5b52bc5b6f84aa08eec314cbea09e55981ba27d09ceab178be1842ec85e85d4016236e5b617427267ef89aef1f8f64a82f89d665db3cfcf2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bb5370d5f151a9a4186eafae51dcdfda

          SHA1

          faab9bdbafa391bcfa53e7001ac8b09dc44c7f53

          SHA256

          3b9596485175fb5279cb545c9517626c9c45775db2da06bbd5df381460109e7b

          SHA512

          317accdeb6deb031ef015679797d74d9ac567dffed4e8cd8f248f7cf020c8266e59436082597cf7e9d581fe0938671e2fd9fce2938ee164df90c74c0d3064abb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          392B

          MD5

          62761d1f997cac490ee29f857885e117

          SHA1

          2318e2e840ea48cd32b82ed9f6e7cc87559e23c9

          SHA256

          133d9bf56c9a32a78aeca940e4b522331797b2b04b3e6417e9a0a3208e315da5

          SHA512

          7ce054ce5cd0a90644941780ec08c0e82b1ffb44fdfd6b04e2a75627312f9b9c05f31e4ff56c353e516e02158cbf7193d498c57de3cd0b6004e62e7e1807c5a5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          997ce6aadced464d435304988b675997

          SHA1

          25a1be1d87a538cadcf7ac9a1cdb663f6d3906b4

          SHA256

          7b7108e6b3875b73eaa8e2eb843f143ae66e7ec1724160f88aa4e90108ce263a

          SHA512

          b78459a38aa546b3eae7bacfed4322551394ddd9286f638b11d0b7943f9aa1a780c568780517ea3f037d2223ac876d062e7acac500dd7d7febe1bdba9dfb2fc1

        • C:\Users\Admin\AppData\Local\8b5a767d-e5d0-4d9c-b744-8181876a3fa5\3b9e9e130d52fe95c8be82aa4b8feb74.exe

          Filesize

          811KB

          MD5

          3b9e9e130d52fe95c8be82aa4b8feb74

          SHA1

          1cad525ecc17fb320bd8256e9cd106b989f97354

          SHA256

          caeecccfee0962fbe3d4fb4ab336bf3d1230b12ad0821ff66f7a2cabc289c954

          SHA512

          bb360a72f52fcb1a26a8e94ab31c74092cbc8f2a2c12756f4f2b2c81a7d96bbdf440b0daad26fbd2593371794061bf0372989dc845333ff882f782280b609e25

        • C:\Users\Admin\AppData\Local\Temp\Tar2222.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • \Users\Admin\AppData\Local\ab3d8a1f-1855-455c-a7c6-78dd824e7e71\build2.exe

          Filesize

          342KB

          MD5

          26544ec9adc1864de80222fb0b38e6dc

          SHA1

          2ca52374bb468a8e2c10d39b64d1e4e9d7d0adee

          SHA256

          03b38ccf2c3145839d5ea7c5ccec609de3a67a7e435e94ca05c8c080d9df4411

          SHA512

          f7eb99db8eb4df15ac252bd4523a407b32089d22c435303499bc3813ecdf1ffbc8483417bb97e901fba3e3f36c6e9e47eb30fa78b7c461d3f78f5d5899fae730

        • memory/1160-7-0x0000000003030000-0x00000000030C2000-memory.dmp

          Filesize

          584KB

        • memory/1160-1-0x0000000003030000-0x00000000030C2000-memory.dmp

          Filesize

          584KB

        • memory/1160-2-0x00000000030D0000-0x00000000031EB000-memory.dmp

          Filesize

          1.1MB

        • memory/1160-0-0x0000000003030000-0x00000000030C2000-memory.dmp

          Filesize

          584KB

        • memory/2096-5-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2096-8-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2096-9-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2096-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2096-45-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2324-98-0x0000000000230000-0x0000000000261000-memory.dmp

          Filesize

          196KB

        • memory/2324-96-0x0000000002F16000-0x0000000002F32000-memory.dmp

          Filesize

          112KB

        • memory/2472-70-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-101-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-71-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-75-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-77-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-78-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-53-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-54-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2472-239-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2532-94-0x0000000000400000-0x0000000000644000-memory.dmp

          Filesize

          2.3MB

        • memory/2532-99-0x0000000000400000-0x0000000000644000-memory.dmp

          Filesize

          2.3MB

        • memory/2532-100-0x0000000000400000-0x0000000000644000-memory.dmp

          Filesize

          2.3MB

        • memory/2532-232-0x0000000000400000-0x0000000000644000-memory.dmp

          Filesize

          2.3MB

        • memory/2532-92-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2736-47-0x00000000002C0000-0x0000000000352000-memory.dmp

          Filesize

          584KB

        • memory/2736-48-0x00000000002C0000-0x0000000000352000-memory.dmp

          Filesize

          584KB