Analysis
-
max time kernel
47s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe
Resource
win11-20240221-en
General
-
Target
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe
-
Size
259KB
-
MD5
eb37bf9e55ec9794c37a1cd473b70272
-
SHA1
58de7f346f3dcb915a1f1a5a73a13fae77233c7c
-
SHA256
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270
-
SHA512
d37a023d4f6712a0a2aa850d4490cb5e6da56075360e9f6d184adde4645e0afd87ed33e23ae7c9fd51f89948956595724108d466915266adc007c0fa587ffb31
-
SSDEEP
6144:OVCijwGD8jFkyIhFxq261Ew8f998oD+3:/wr8j+FZq2nXz5q
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://sajdfue.com/test1/get.php
-
extension
.vook
-
offline_id
1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1
-
payload_url
http://sdfjhuz.com/dl/build2.exe
http://sajdfue.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.0:29587
Signatures
-
Detected Djvu ransomware 9 IoCs
Processes:
resource yara_rule behavioral1/memory/3088-21-0x0000000002860000-0x000000000297B000-memory.dmp family_djvu behavioral1/memory/2808-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-22-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-36-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/208-42-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/208-43-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/208-45-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4692-59-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
A1DE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation A1DE.exe -
Deletes itself 1 IoCs
Processes:
pid process 3376 -
Executes dropped EXE 6 IoCs
Processes:
A1DE.exeA1DE.exeA1DE.exeA1DE.exeAD1A.exeE5B0.exepid process 3088 A1DE.exe 2808 A1DE.exe 4608 A1DE.exe 208 A1DE.exe 2604 AD1A.exe 2980 E5B0.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
A1DE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\5b3d6843-eba5-4427-a9ec-e6682e424a28\\A1DE.exe\" --AutoStart" A1DE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 api.2ip.ua 28 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
Processes:
A1DE.exeA1DE.exeAD1A.exedescription pid process target process PID 3088 set thread context of 2808 3088 A1DE.exe A1DE.exe PID 4608 set thread context of 208 4608 A1DE.exe A1DE.exe PID 2604 set thread context of 4692 2604 AD1A.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3568 208 WerFault.exe A1DE.exe 932 2604 WerFault.exe AD1A.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exepid process 1204 f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe 1204 f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exepid process 1204 f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
AD1A.exeRegAsm.exedescription pid process Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeDebugPrivilege 2604 AD1A.exe Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 Token: SeDebugPrivilege 4692 RegAsm.exe Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
cmd.exeA1DE.exeA1DE.exeA1DE.exeAD1A.exedescription pid process target process PID 3376 wrote to memory of 3928 3376 cmd.exe PID 3376 wrote to memory of 3928 3376 cmd.exe PID 3928 wrote to memory of 1356 3928 cmd.exe reg.exe PID 3928 wrote to memory of 1356 3928 cmd.exe reg.exe PID 3376 wrote to memory of 3088 3376 A1DE.exe PID 3376 wrote to memory of 3088 3376 A1DE.exe PID 3376 wrote to memory of 3088 3376 A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 3088 wrote to memory of 2808 3088 A1DE.exe A1DE.exe PID 2808 wrote to memory of 3116 2808 A1DE.exe icacls.exe PID 2808 wrote to memory of 3116 2808 A1DE.exe icacls.exe PID 2808 wrote to memory of 3116 2808 A1DE.exe icacls.exe PID 2808 wrote to memory of 4608 2808 A1DE.exe A1DE.exe PID 2808 wrote to memory of 4608 2808 A1DE.exe A1DE.exe PID 2808 wrote to memory of 4608 2808 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 4608 wrote to memory of 208 4608 A1DE.exe A1DE.exe PID 3376 wrote to memory of 2604 3376 AD1A.exe PID 3376 wrote to memory of 2604 3376 AD1A.exe PID 3376 wrote to memory of 2604 3376 AD1A.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 2604 wrote to memory of 4692 2604 AD1A.exe RegAsm.exe PID 3376 wrote to memory of 2980 3376 E5B0.exe PID 3376 wrote to memory of 2980 3376 E5B0.exe PID 3376 wrote to memory of 2980 3376 E5B0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe"C:\Users\Admin\AppData\Local\Temp\f4ddc32a5112ba367c194ff4619caed816b1f5941772a50b81f4ddc59db84270.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8E65.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\A1DE.exeC:\Users\Admin\AppData\Local\Temp\A1DE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\A1DE.exeC:\Users\Admin\AppData\Local\Temp\A1DE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\5b3d6843-eba5-4427-a9ec-e6682e424a28" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\A1DE.exe"C:\Users\Admin\AppData\Local\Temp\A1DE.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\A1DE.exe"C:\Users\Admin\AppData\Local\Temp\A1DE.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 5685⤵
- Program crash
PID:3568
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 208 -ip 2081⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\AD1A.exeC:\Users\Admin\AppData\Local\Temp\AD1A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 8282⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2604 -ip 26041⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\E5B0.exeC:\Users\Admin\AppData\Local\Temp\E5B0.exe1⤵
- Executes dropped EXE
PID:2980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E7A5.bat" "1⤵PID:4940
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
758KB
MD5601c8193122d6d0b2327d4641128fb0f
SHA11807a55ad3ec3d575e055e7f65c7461165074a6a
SHA256429b58dfe9191bce5a00ced0ba190e2518cd8f48d7358119d61335e504169a57
SHA512d021ee206e441e152ec04329b7967ee1f6d431288060cc28a3c50b0f35bc3220dac37955188e1a7e4ba0b57a55089e6381ff490718dba528bd87eea07276e820
-
Filesize
392KB
MD589ec2c6bf09ed9a38bd11acb2a41cd1b
SHA1408549982b687ca8dd5efb0e8b704a374bd8909d
SHA256da1e155c46ca6b23409d059b6d85341c0b86c92d2c69dbda85eef3894313662d
SHA512c565dbb25dd35ae8dce2a4cf15640053aca8b99c5c78db23648e6618ef316362b77142c6524b47089a7ea05632adee091ec5e82ed95aeb86d2331b8c5f8cc56a
-
Filesize
3.8MB
MD5dcf11fb962b1f98b112e5dcd6ccb96be
SHA1ecf9eb5044044c11049f06826ae4d498cefad476
SHA256e1e1089524a5c2b909d368c1eb6673688407794ba8083ecf2d74a4aa63af61d7
SHA5122ba5c9b80b3c1a6c2b9ea4002d04c49aae9576d9c09e883dac119b947049fd800ff108e3b67fd18a4a68886046f309b4a2aac0dea9fef616b3cb84ce0543fc85
-
Filesize
4.0MB
MD554caee3343c5bf948b0da7aae045f665
SHA1fad51cad18f6d255166b370c3bd5daee23b32b76
SHA256e919c41f23b40046fcf8fb5b4eeee9429365d71f51b00ebd09e8c1c5ef229f85
SHA5125b58b76e25dd99f1d04325194cb8aa7a25682efce405e7c83fff269e1f4b1bb070ddd46746df496b110285fa033dd52f103b3691e164aa215947a5b768b9a974