Malware Analysis Report

2025-06-16 05:07

Sample ID 240409-jw15kaab62
Target ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6
SHA256 ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6
Tags
djvu discovery persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6

Threat Level: Known bad

The file ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6 was found to be: Known bad.

Malicious Activity Summary

djvu discovery persistence ransomware

Djvu Ransomware

Detected Djvu ransomware

Modifies file permissions

Checks computer location settings

Adds Run key to start application

Looks up external IP address via web service

Suspicious use of SetThreadContext

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-09 08:01

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-09 08:01

Reported

2024-04-09 08:04

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d8acdbf3-1d14-4016-af26-97057cb9b9c6\\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4036 wrote to memory of 732 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 732 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 732 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 732 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 732 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 732 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 732 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4548 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\d8acdbf3-1d14-4016-af26-97057cb9b9c6" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4568 -ip 4568

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 568

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 220.139.67.172.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

memory/4036-1-0x0000000004A70000-0x0000000004B0E000-memory.dmp

memory/4036-2-0x0000000004B10000-0x0000000004C2B000-memory.dmp

memory/732-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/732-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/732-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/732-6-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\d8acdbf3-1d14-4016-af26-97057cb9b9c6\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

MD5 853cc78a670e6ac494a7daf873b84d2b
SHA1 65034a73ece0f47a512b0169b4bb8d7327eb5ee7
SHA256 ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6
SHA512 384379dc5bc40d1690bc1ed94c324e2b24dc17ad1ea08a41bcc66350a6619d1f2a51a1111b8b9c2e8fd7f5e21c291eb1f7b00ce942dc4666ddeff11acb357d83

memory/732-15-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4548-18-0x0000000002F40000-0x0000000002FD3000-memory.dmp

memory/4568-20-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4568-21-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4568-23-0x0000000000400000-0x0000000000537000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-09 08:01

Reported

2024-04-09 08:04

Platform

win11-20240221-en

Max time kernel

149s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b3a32004-0fca-418c-8025-d7388bb7e214\\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 1636 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4880 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 4880 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 4880 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Windows\SysWOW64\icacls.exe
PID 4880 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4880 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 4880 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe
PID 772 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\b3a32004-0fca-418c-8025-d7388bb7e214" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

"C:\Users\Admin\AppData\Local\Temp\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 104.21.65.24:443 api.2ip.ua tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 24.65.21.104.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 104.21.65.24:443 api.2ip.ua tcp
CO 186.147.159.149:80 sdfjhuz.com tcp
KR 211.119.84.111:80 sajdfue.com tcp
KR 211.119.84.111:80 sajdfue.com tcp
KR 211.119.84.111:80 sajdfue.com tcp
KR 211.119.84.111:80 sajdfue.com tcp
KR 211.119.84.111:80 sajdfue.com tcp

Files

memory/1636-1-0x0000000004AA0000-0x0000000004B35000-memory.dmp

memory/1636-2-0x0000000004B40000-0x0000000004C5B000-memory.dmp

memory/4880-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4880-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4880-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4880-6-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\b3a32004-0fca-418c-8025-d7388bb7e214\ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6.exe

MD5 853cc78a670e6ac494a7daf873b84d2b
SHA1 65034a73ece0f47a512b0169b4bb8d7327eb5ee7
SHA256 ed47d943001dc4d214f723f83e7443f91dfbe0e72a17f9bc1f536465c9036cb6
SHA512 384379dc5bc40d1690bc1ed94c324e2b24dc17ad1ea08a41bcc66350a6619d1f2a51a1111b8b9c2e8fd7f5e21c291eb1f7b00ce942dc4666ddeff11acb357d83

memory/4880-18-0x0000000000400000-0x0000000000537000-memory.dmp

memory/772-20-0x0000000004AA0000-0x0000000004B39000-memory.dmp

memory/1180-22-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-23-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-24-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 a34ff07789d8c10e95ab13e0317749f1
SHA1 e7025cbaf8e3853186f1c8363ef4311041bb2844
SHA256 3c719f08fdcf9de9664d442ad42e3ea122497f9a77762e1cebe88217cb6ba885
SHA512 cc29b9ddc6f385b5675f3168ffec8c9b346db3d2128d725ec2e408b3a4066e690d8a2677727a51fbe7f84356f41c60f315873ef5b8c132598c38979eba8384c6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 fc5408c48a55314c72e200b74330cac4
SHA1 7e8889ec3189a40e6078088927bf3612753fa628
SHA256 7ea2a016d97635b1367455af2250cbf9e9c34d293829d11fc21ce905347590c4
SHA512 481753ef755c188012919ea728ea0395f22b6ce83f2f9a11675be6072f154db141b2382dc62ad7c3c95e36596529176a66f40e3d118cf0e33ea8e6f716ae1d77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 99b0f15a79de51abcd3082b95d9e94a5
SHA1 a703df786b0dd9ff6e1092219191037fa061ddd3
SHA256 18c1efe688d64db3e09df6c248ba890f5f37c3cf42089ad12abe978b3e56757c
SHA512 acd2349af80dade6ed74436bb173ddf6e8e6be507bab1ef79795d3e7a082faeb3a91e0153177e067dc60ef006386effcc589dad694b2e7a3cbebd295d59ce3b2

memory/1180-29-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-30-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-31-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-36-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-37-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-38-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-39-0x0000000000400000-0x0000000000537000-memory.dmp