Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/04/2024, 19:01

General

  • Target

    be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe

  • Size

    719KB

  • MD5

    14d420d8a346ae5e59617598540e607d

  • SHA1

    5f3667055fd5db1b7a26e349447c10de88fa697e

  • SHA256

    be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc

  • SHA512

    18ff9a47dd7a004531e59fb6d35b974a6a61e499fca3258b5d370d943f3dc81c8c85c9fb8ec120d87faadad1c9628c34d0fce6f20c00b843ef7a57bc38a010ed

  • SSDEEP

    12288:d1Wu6AuFD1zL/5IBDHeFjaqpB9VuLIs08bYB14wwVwBQPKGx5HDW/r0w3QD:bWndLuh+RaqNV3sBqwVwBxGx5CD0w3Q

Malware Config

Extracted

Family

djvu

C2

http://sajdfue.com/raud/get.php

Attributes
  • extension

    .kaaa

  • offline_id

    RYwGAer1qFhOx8AGvEwPaJsJ2FKa8ifjKW9FVet1

  • payload_url

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/df01994dd8d37c2c33469922f8e7155a20240402134014/fd95b0 Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0862PsawqS

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 24 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Renames multiple (155) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
    "C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
      "C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:4996
      • C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
        "C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
          "C:\Users\Admin\AppData\Local\Temp\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3268
  • C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
    C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe --Task
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
      C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe --Task
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3524
  • C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
    C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe --Task
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe
      C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe --Task
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    9b6db1ab38d6a6d2da6a243f6c535959

    SHA1

    5ad7f03d79e9f8da3027d634cdb987bd7ad83643

    SHA256

    f8ab0227091978f14c8ef610aecaff032714787ebce7f213171116cadf14ba15

    SHA512

    2718d224fbe706724bfe59a34cdfa6d657a3014a779a4c602419dc8d63cf1856608d3087d68d5ff6983c76a5633d2c35310278b49dc3f914166ff448a52c509b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    0141160eebef1d23b2d8ed88cd47f6db

    SHA1

    41bc8468130d529a8f0117c4a601bb08d0641828

    SHA256

    f5ca162e23c36187254f7dfcbc16223323e67dbf5ad9cfc75a960c44fd5ced50

    SHA512

    b400d4c66f4d982dd8a7c036c1f2167dcd89b97a15d7d0e33bae1f933d2ad57262a23c62008135421383de01aebb76617be1a0e8aa1ad66f8afeeef8e802e334

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    c067615b24f9c5861cff7cc43ee09f7c

    SHA1

    4335aff80fb8bfab306984836210a6ba0d09c6e3

    SHA256

    2d32e75fad96efed854a8cba69e35a04fc89bc38abcde8e45dbfa56f0cba5d19

    SHA512

    349c31133dc677308a344019cb3be90ae1c4f5ab6d56ffe61764b16fcc5a736a06dfbfc23336d2fbd8cece9c54452d06886bdb749e10d74ad24305740069f5a9

  • C:\Users\Admin\AppData\Local\18610dce-6c9e-4eba-afee-7459096ff5cf\be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc.exe

    Filesize

    719KB

    MD5

    14d420d8a346ae5e59617598540e607d

    SHA1

    5f3667055fd5db1b7a26e349447c10de88fa697e

    SHA256

    be7fdfefa6dac04e9183e54a76fdca06fb8bf501381ce0d0fe9a227f452a20fc

    SHA512

    18ff9a47dd7a004531e59fb6d35b974a6a61e499fca3258b5d370d943f3dc81c8c85c9fb8ec120d87faadad1c9628c34d0fce6f20c00b843ef7a57bc38a010ed

  • memory/1984-50-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1984-48-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1984-49-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/1984-47-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3068-44-0x0000000004920000-0x00000000049BB000-memory.dmp

    Filesize

    620KB

  • memory/3268-31-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-32-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-23-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-22-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-373-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-371-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-25-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-55-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-57-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-58-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-40-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-41-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-42-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-39-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3852-1-0x0000000004A40000-0x0000000004AE0000-memory.dmp

    Filesize

    640KB

  • memory/3852-2-0x0000000004BC0000-0x0000000004CDB000-memory.dmp

    Filesize

    1.1MB

  • memory/4076-36-0x0000000004930000-0x00000000049CF000-memory.dmp

    Filesize

    636KB

  • memory/4432-4-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4432-3-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4432-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4432-6-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4432-17-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4624-20-0x0000000004980000-0x0000000004A21000-memory.dmp

    Filesize

    644KB