Malware Analysis Report

2024-10-23 16:23

Sample ID 240522-fnslnscf66
Target ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea
SHA256 ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea
Tags
djvu discovery persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea

Threat Level: Known bad

The file ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea was found to be: Known bad.

Malicious Activity Summary

djvu discovery persistence ransomware

Djvu Ransomware

Detected Djvu ransomware

Modifies file permissions

Checks computer location settings

Looks up external IP address via web service

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-22 05:01

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 05:01

Reported

2024-05-22 05:04

Platform

win11-20240508-en

Max time kernel

143s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f52ddfc3-99cd-4a49-ad72-d58b0bce7c4e\\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2988 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2984 wrote to memory of 4848 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 2984 wrote to memory of 4848 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 2984 wrote to memory of 4848 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 2984 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2984 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2984 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 2104 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\f52ddfc3-99cd-4a49-ad72-d58b0bce7c4e" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 172.67.139.220:443 api.2ip.ua tcp
BR 191.186.138.218:80 sdfjhuz.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
US 52.111.229.43:443 tcp

Files

memory/2988-1-0x0000000004B40000-0x0000000004BDD000-memory.dmp

memory/2988-2-0x0000000004BE0000-0x0000000004CFB000-memory.dmp

memory/2984-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2984-6-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2984-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2984-3-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\f52ddfc3-99cd-4a49-ad72-d58b0bce7c4e\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

MD5 967be9af9f69700577c315c55b878f49
SHA1 67a95ed7f485a44aee16acc3ed99e817e8b9be66
SHA256 ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea
SHA512 4ce1f72258d3072237588601666514ad5774a8bc11ff8b774f2a6e38b6bb23a71efd39ab7d700c498bf583eba15d238b415e17c62bb579de75aaef39eef183dd

memory/2984-19-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-22-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 f3a585ec62bd97f4098a7498a9e1291d
SHA1 d083569ea5d376ecff31f2518cb3a0f8a5c2c3b2
SHA256 0caa95ed957e76584e72ac689ec9b12bbf27acad7ce80035975b75fcbacbe22d
SHA512 d2d23c0101041459e31403568a35fd75db3eded561f158088be2c15416feb3595ee4f7e2bbbdb8b7375e318ffe714a34dcc8e768db40e265b8c60da20553ac41

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 cb35bd9d6c5a4fd50a9263018bbd9784
SHA1 efec24f93d2af7bd01969c36870ebc928fa6c790
SHA256 be648ee93df285417e494e28c01e3ab8f3d043845f4d3b397dfd137d187ed612
SHA512 ac26182fb167458da4b465b118720470859e8028db8d3d71ddbe0c5be0e46b9178c5f7ccb8b1252c38754e27da1af546f8d2f6e32e1bfcbeac0d510aa831bf11

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 a3862dfca80cfda4dacd1480e2cc3f8f
SHA1 b7c457f0e8d5b1c6acbb54bc6c470b061d2ae3d9
SHA256 91b4d9577668b332f69d33b68f2fc12ebddea4f5b8a48c565ca3b1fd30339048
SHA512 ea8d631e690e6ff2bc92cd77a43d4c8e92e16803fcef174bf19816895122d6a3d1541661648e67fd3573b9256d2c98c75efe31275a9854b29185b9c2c14cc8db

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

memory/1180-27-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-28-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-29-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-32-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-35-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-36-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1180-37-0x0000000000400000-0x0000000000537000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 05:01

Reported

2024-05-22 05:04

Platform

win10v2004-20240508-en

Max time kernel

141s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\cd069696-693e-4b3d-802a-5d4530a07ce2\\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 5052 wrote to memory of 3124 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 3124 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 3124 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 3124 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Windows\SysWOW64\icacls.exe
PID 3124 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 3124 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 3124 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe
PID 880 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\cd069696-693e-4b3d-802a-5d4530a07ce2" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

"C:\Users\Admin\AppData\Local\Temp\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 220.139.67.172.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 sdfjhuz.com udp
US 8.8.8.8:53 cajgtus.com udp
CO 190.147.2.86:80 cajgtus.com tcp
BR 191.186.138.218:80 sdfjhuz.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
US 8.8.8.8:53 86.2.147.190.in-addr.arpa udp
US 8.8.8.8:53 218.138.186.191.in-addr.arpa udp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
CO 190.147.2.86:80 cajgtus.com tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/5052-1-0x0000000004980000-0x0000000004A1A000-memory.dmp

memory/5052-2-0x0000000004A20000-0x0000000004B3B000-memory.dmp

memory/3124-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3124-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3124-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3124-6-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\cd069696-693e-4b3d-802a-5d4530a07ce2\ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea.exe

MD5 967be9af9f69700577c315c55b878f49
SHA1 67a95ed7f485a44aee16acc3ed99e817e8b9be66
SHA256 ddfe99e9494e00eecf0e20fc856edbe7d1763131790c60e6d307ead14df3d1ea
SHA512 4ce1f72258d3072237588601666514ad5774a8bc11ff8b774f2a6e38b6bb23a71efd39ab7d700c498bf583eba15d238b415e17c62bb579de75aaef39eef183dd

memory/3124-17-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-20-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 cb35bd9d6c5a4fd50a9263018bbd9784
SHA1 efec24f93d2af7bd01969c36870ebc928fa6c790
SHA256 be648ee93df285417e494e28c01e3ab8f3d043845f4d3b397dfd137d187ed612
SHA512 ac26182fb167458da4b465b118720470859e8028db8d3d71ddbe0c5be0e46b9178c5f7ccb8b1252c38754e27da1af546f8d2f6e32e1bfcbeac0d510aa831bf11

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 8bac3167e164942e74503d57a12b6d3e
SHA1 420229ffb5707fcff1f89d5bacaf1b64f504dad3
SHA256 6637b6fc25a8f3a5162635f1d3d1c7dde3764f89454a1a37376a080e9a2d7ebf
SHA512 44261e1ea06e3102c7e87804ee25d146529fdf63b6803e5365e1294ddcae197b3d6cdf0b6faa69120adba133be5136bdae10e34bc61c4f953881abadcde6348f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 1d28c8fac4be2023e8b03739d5b76aa9
SHA1 c799e111fd442c5a6dc8f03d7913ac72e04ec181
SHA256 68518de82c1a74cc471b5e9e2714eb991d28cf56f2f65474dddf6ae60e1173bf
SHA512 91578a8ae75493d47945e5a67bdd38e83bf9676e4e1dc325706171a625da2ee3c3594b6667bde98321bdb66cc9868d0418c1f68e3524145144ac3b1472ead16f

memory/2160-25-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-26-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-27-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-30-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-32-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-33-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2160-35-0x0000000000400000-0x0000000000537000-memory.dmp