Analysis
-
max time kernel
27s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
78E.tmp.exe
Resource
win7-20240319-en
General
-
Target
78E.tmp.exe
-
Size
466KB
-
MD5
246d6fa957bd9bd9bd444ba8a6c38457
-
SHA1
fb90a2e9e3f3d4bf350a5c8d475c843f072bc1f5
-
SHA256
9c17cc38feddc8aec42f4d7e84ff85260e0e5d955c38e42573a21c18836c7a59
-
SHA512
95e3135f417fdfd91c8e57545c246c5a0f5efc40fe1e3ef745b8283c35b156d7814934be5983dd5532b7fb789a4032a3e1d619281d0e4e1b465b86f2a036e3bb
-
SSDEEP
6144:agBl9KO2wSlnYlm8px3b3RY+F2q9QgW6jw5oJ48ph1nt2EuqAs00:aEKOZSlnbE3b3RiqW6jw5o6831/A
Malware Config
Extracted
djvu
http://root.ug/Asjdhfiughdhhjbdfh45687husdfhipenelop8/Asdhuage7386/get.php
-
extension
.sarut
-
offline_id
pQseAIqgTVhPujMMiqH1ILPNUg3soGVim0NAnkt1
-
payload_url
http://pool.ug/tesptc/penelop/updatewin1.exe
http://pool.ug/tesptc/penelop/updatewin2.exe
http://pool.ug/tesptc/penelop/updatewin.exe
http://pool.ug/tesptc/penelop/3.exe
http://pool.ug/tesptc/penelop/4.exe
http://pool.ug/tesptc/penelop/5.exe
-
ransomnote
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-1aTCryfzhK Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Our Telegram account: @datarestore Your personal ID: 078AKsudu438fyasfs
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral1/memory/1192-2-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/1192-54-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/2336-63-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/2336-82-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/1908-164-0x0000000140000000-0x00000001405E8000-memory.dmp family_djvu behavioral1/memory/1880-169-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/1880-177-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/2584-182-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu behavioral1/memory/2584-187-0x0000000000400000-0x00000000004BC000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1580 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\9ce9d5c2-0de5-4da3-a6eb-814beb75e57a\\78E.tmp.exe\" --AutoStart" 78E.tmp.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.2ip.ua 10 api.2ip.ua 23 api.2ip.ua 28 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 1192 78E.tmp.exe 1192 78E.tmp.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe Token: SeShutdownPrivilege 3044 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2540 3044 chrome.exe 30 PID 3044 wrote to memory of 2540 3044 chrome.exe 30 PID 3044 wrote to memory of 2540 3044 chrome.exe 30 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2532 3044 chrome.exe 32 PID 3044 wrote to memory of 2444 3044 chrome.exe 33 PID 3044 wrote to memory of 2444 3044 chrome.exe 33 PID 3044 wrote to memory of 2444 3044 chrome.exe 33 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34 PID 3044 wrote to memory of 2396 3044 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\9ce9d5c2-0de5-4da3-a6eb-814beb75e57a" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6529758,0x7fef6529768,0x7fef65297782⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:22⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1576 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:22⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1300 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3232 --field-trial-handle=1272,i,2771480762283650113,11494373980713344061,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1712
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:1908
-
C:\Windows\system32\taskeng.exetaskeng.exe {A12F23BD-DD4B-409D-B2D0-98A4151A0509} S-1-5-21-2610426812-2871295383-373749122-1000:UEITMFAB\Admin:Interactive:[1]1⤵PID:2568
-
C:\Users\Admin\AppData\Local\9ce9d5c2-0de5-4da3-a6eb-814beb75e57a\78E.tmp.exeC:\Users\Admin\AppData\Local\9ce9d5c2-0de5-4da3-a6eb-814beb75e57a\78E.tmp.exe --Task2⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\78E.tmp.exe"1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466KB
MD5246d6fa957bd9bd9bd444ba8a6c38457
SHA1fb90a2e9e3f3d4bf350a5c8d475c843f072bc1f5
SHA2569c17cc38feddc8aec42f4d7e84ff85260e0e5d955c38e42573a21c18836c7a59
SHA51295e3135f417fdfd91c8e57545c246c5a0f5efc40fe1e3ef745b8283c35b156d7814934be5983dd5532b7fb789a4032a3e1d619281d0e4e1b465b86f2a036e3bb
-
Filesize
264KB
MD52921a710159fcc80e1f4e933e9ae0462
SHA1df68ce16f5bb76ff7f58eab16b33e309fa651fde
SHA25615c92f09dab6b3902c6219b4047cdc2e7ba7b5d6281071a49c545a94832370b3
SHA512a20f28cd8824f384ae633d2a9fc60f9beb8bb4134075cdf0bab87e19f3e2275bf3752bf70c804c29af6cf91371c13729a776e5b4debac62dc958be0b87443492
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD54ac9e508777758aa1ee90bafa789d34b
SHA10b4efff98bbbfaed729191d631433c30c2eafeda
SHA2566a910594a0d1f87d35f757ce5d7a04a6518b6988f7b8f5370a80242e2e062a34
SHA51226ec484fc4e87cc484a2faeb4f8cc327883b635bcf670501bd978c9478f838e1263f1af3b613cd690046c74f8bd8c58a1d19adbbaf8ba8a6ee1a7e3ef215adea
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5bc0df8f043c2e758ea4077cb115de29f
SHA16e75be38f7eeaf607e31d86ac71ba004fed190bc
SHA256ffee54341debd0d89e0a24798ae5d1b6a09d26b9c092deee827b0dd7bb899d9a
SHA512b5bfbe8d42e72028633c6255a281419b8269174bd157c48bdbfa35557c294d915fc190215e0a483466788fa0fd46d29e84e92e6a96a1733463b196dba7ffcb72