Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 01:47

General

  • Target

    994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe

  • Size

    761KB

  • MD5

    cbc0fb83669b4e7e03caa5c74f06be9a

  • SHA1

    72dfbdd5cdb7b3d4a856bfc5a57c437ff354cfbf

  • SHA256

    994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b

  • SHA512

    50aaad65599e7208e03fb41208f7c0c7e59b3320eafcf584c480f7bc3df819b72b1460006697050cf6ccd705c72e0349b5d11377782c6180a15f2961a3a857ee

  • SSDEEP

    12288:jriKZ0glHC70fdkwte/TMM0GKBlaHRUwQEvjAQ1UAXOhPlsOMzGY3X:jrBZ0gE70dtughGWoRXjAachSOMzt

Malware Config

Extracted

Family

djvu

C2

http://cajgtus.com/test1/get.php

Attributes
  • extension

    .qepi

  • offline_id

    jgILOjDrBgyzY4JmT3B2jDSyBmDPBruKk8bKs6t1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://cajgtus.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/665ddae3fc3cd10bbaaa4350408b196920240504141005/4cae7e Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0867PsawqS

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe
    "C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe
      "C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\5ffece36-c2ec-4f06-88a0-513c1cb1c1d7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2704
      • C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe
        "C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe
          "C:\Users\Admin\AppData\Local\Temp\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    980db886f2cbf3110b71813f1c55cca9

    SHA1

    a574aa7b6f0ae88191d135161b0329202957aba3

    SHA256

    ca3b546e0b8ceb8c92416dc5081dbe1f5ea28c80fc867078c966c981138b7cf6

    SHA512

    52a238e4ae4351b9a8074032a909fdf7b86da856f6fb430eec3fa58b6745a83a57d9a3e1c91f718ea102c131fb34230ebcb9ae8e32d86f84e75168975329abca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    905011c219f2e47e89d7b5aeac544e56

    SHA1

    8c8daafeb124115d535e2168ef859944921ba08a

    SHA256

    7ac3af74f0086deda7fa5ce7497237b54c2db3494b07033a8786cee421eb2565

    SHA512

    2bfbc26db6bd2fd2d5e8da0bc94b2ed89698ef207cf7d4b5bc678478318857b3b6288ee341adf51467b526485ee46a4a6bc25eedf455f7bce6194dd6afbf8f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49022d02e79cf17c70ec2d1d5d459d62

    SHA1

    e6c40678def06a589d28e6a97c47b809167ca5e3

    SHA256

    deef1f4773641c41bc0ad8d419b2364b9b69da3623ffc895e9c3af836a5e9f44

    SHA512

    eb71093bd4b4dc65e4bdf90ba9f1b465c9cf230837ba69f6b74e5ffa43fe4355d530eaef21bd7a8e6311a070cc62b253e0eb3d8bcf8b079ea11df3cfe18f6486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    2a4a89bfe257637560575429658f1d9a

    SHA1

    173fd0aee8f18c7a596dc8da4f512d848de6dd67

    SHA256

    6711e4fb1348e5c3756c6de2b08a2fae7e6882e278eeab1915eab3d229b9717f

    SHA512

    a0b30f01a869b08c438b097b2bdaf625f71f790e9208db10155601bfce6bfb4bf64e583df2d26449114a1ddb9f9207fb7322b73d367a15e503ab0ee0b828b57c

  • C:\Users\Admin\AppData\Local\5ffece36-c2ec-4f06-88a0-513c1cb1c1d7\994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b.exe

    Filesize

    761KB

    MD5

    cbc0fb83669b4e7e03caa5c74f06be9a

    SHA1

    72dfbdd5cdb7b3d4a856bfc5a57c437ff354cfbf

    SHA256

    994c5358406c1383ecd084dc860a5d01ec6cad18afa0fa200bbefb339031390b

    SHA512

    50aaad65599e7208e03fb41208f7c0c7e59b3320eafcf584c480f7bc3df819b72b1460006697050cf6ccd705c72e0349b5d11377782c6180a15f2961a3a857ee

  • C:\Users\Admin\AppData\Local\Temp\Cab3514.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • memory/2476-29-0x0000000002B80000-0x0000000002C12000-memory.dmp

    Filesize

    584KB

  • memory/2844-0-0x00000000002E0000-0x0000000000372000-memory.dmp

    Filesize

    584KB

  • memory/2844-6-0x00000000044B0000-0x00000000045CB000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-1-0x00000000002E0000-0x0000000000372000-memory.dmp

    Filesize

    584KB

  • memory/2952-46-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-32-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-45-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-47-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-50-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-53-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-52-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2952-54-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-28-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-8-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-7-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/3052-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3052-4-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB