Malware Analysis Report

2024-10-19 01:49

Sample ID 240522-s8ddpsgc4w
Target 71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673
SHA256 71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673
Tags
djvu discovery persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673

Threat Level: Known bad

The file 71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673 was found to be: Known bad.

Malicious Activity Summary

djvu discovery persistence ransomware

Djvu Ransomware

Detected Djvu ransomware

Checks computer location settings

Modifies file permissions

Adds Run key to start application

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-22 15:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-22 15:47

Reported

2024-05-22 15:49

Platform

win10v2004-20240426-en

Max time kernel

142s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ebdacf0e-04d6-461a-880a-f9c7809b492e\\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2564 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2008 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2008 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2008 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2008 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2008 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2008 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 1376 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

Processes

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\ebdacf0e-04d6-461a-880a-f9c7809b492e" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 220.139.67.172.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 172.67.139.220:443 api.2ip.ua tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 sdfjhuz.com udp
US 8.8.8.8:53 cajgtus.com udp
JO 176.29.154.25:80 cajgtus.com tcp
PE 190.12.87.61:80 sdfjhuz.com tcp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 25.154.29.176.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
JO 176.29.154.25:80 cajgtus.com tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 61.87.12.190.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
JO 176.29.154.25:80 cajgtus.com tcp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
JO 176.29.154.25:80 cajgtus.com tcp
JO 176.29.154.25:80 cajgtus.com tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/2564-1-0x0000000004990000-0x0000000004A28000-memory.dmp

memory/2564-4-0x0000000004AA0000-0x0000000004BBB000-memory.dmp

memory/2008-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2008-2-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2008-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2008-6-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\ebdacf0e-04d6-461a-880a-f9c7809b492e\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

MD5 2fa6ec658c61947f197c939f130bac1d
SHA1 363abe0b0187e0463b32178057ddbc14e3853846
SHA256 71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673
SHA512 8708184d91622fe81664a98a5ce117e0107cb73c8f62b40fb3e60985cef1c84dda42359f55dc02beec551d62dcbabb6c3c2f28e079d92d70a35f5f97c0da71ce

memory/2008-19-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-22-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 ab29a129fb9535766986c227198215df
SHA1 8c293c96731a59aaaf35577d6953c54d11ba08a5
SHA256 50510cdf23f76215094145e2fc69fae77a265aa2f16a21769196f1e11af02b74
SHA512 06d96f524b43c5fbaedf9cbad13125c1e70d75ab9d99e2c39742214b59520f07cf7c4568e261b8c1a722a777f72bab491dd46c1bc106c8a6c79289cb4365a254

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 6728aea2631b86a76c237508d8ba9b55
SHA1 7a670f95cac088313f7558869162fe01c6dc0ec9
SHA256 e1dd7380c6df33cd5702b032e0e359029d3ef7630f06ceb42cfdc154fd0baf7b
SHA512 533080cd1ec40b8530cad5c9914e0a5156d225f7392283ed2607eda4f1db4a6930002274060ed9130a6f634222c2e15818e16a50579cfe7f5274d028d31212f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 63e1ddbb8f2c94f70bee143f23268dac
SHA1 26ed2d8e19bec7f96829825c3d0d873600cd842b
SHA256 9616ef5abf08eb417d8f7da165a327d58a8c170f762564ea6a00fe3b63c93ceb
SHA512 ee346010e8ecc0b224a6c27ab67afd41d499ba598f7a37036f6f1eee1de0c1609cac74b4ef7ae8d7af2680cd6e8c79cbcc982112ff408d8b4573c6161fc4eb6e

memory/2400-28-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-27-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-29-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-32-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-35-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-36-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-37-0x0000000000400000-0x0000000000537000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-22 15:47

Reported

2024-05-22 15:49

Platform

win7-20240508-en

Max time kernel

143s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\54fd22bc-1a8d-4954-85f8-d9c0a37b8996\\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2176 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2472 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2472 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2472 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2472 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Windows\SysWOW64\icacls.exe
PID 2472 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2472 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2472 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2472 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe
PID 2508 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

Processes

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\54fd22bc-1a8d-4954-85f8-d9c0a37b8996" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

"C:\Users\Admin\AppData\Local\Temp\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 104.21.65.24:443 api.2ip.ua tcp
US 104.21.65.24:443 api.2ip.ua tcp
US 8.8.8.8:53 sdfjhuz.com udp
US 8.8.8.8:53 cajgtus.com udp
KR 123.212.43.225:80 cajgtus.com tcp
IR 37.255.238.137:80 sdfjhuz.com tcp
KR 123.212.43.225:80 cajgtus.com tcp
KR 123.212.43.225:80 cajgtus.com tcp
KR 123.212.43.225:80 cajgtus.com tcp
KR 123.212.43.225:80 cajgtus.com tcp

Files

memory/2176-0-0x0000000000220000-0x00000000002B2000-memory.dmp

memory/2472-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2176-6-0x0000000002D10000-0x0000000002E2B000-memory.dmp

memory/2472-7-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2176-5-0x0000000000220000-0x00000000002B2000-memory.dmp

memory/2472-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2472-8-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\54fd22bc-1a8d-4954-85f8-d9c0a37b8996\71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673.exe

MD5 2fa6ec658c61947f197c939f130bac1d
SHA1 363abe0b0187e0463b32178057ddbc14e3853846
SHA256 71babb4e984c118392eccc24b1ce4909e41ee2b49c17ad105c64f42847db5673
SHA512 8708184d91622fe81664a98a5ce117e0107cb73c8f62b40fb3e60985cef1c84dda42359f55dc02beec551d62dcbabb6c3c2f28e079d92d70a35f5f97c0da71ce

memory/2472-28-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2508-29-0x0000000000220000-0x00000000002B2000-memory.dmp

memory/2536-32-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 866ee5a41863b4f4e4669c706939e5cc
SHA1 6d6670b1d3b57d6ea43bad28129da25bb3631961
SHA256 6e3270da4414f622e53dfc2a185a78697c2edb1812fb334c697dc1eddd4c782b
SHA512 a9afa70e3c230b6202c5a29de83645c4daa10b692ed97184ae4846a3ed4a68002d08123a457480f022668d2be8fb23a1b74cc7f9b14dbbdc35caaf33d531a78a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 6728aea2631b86a76c237508d8ba9b55
SHA1 7a670f95cac088313f7558869162fe01c6dc0ec9
SHA256 e1dd7380c6df33cd5702b032e0e359029d3ef7630f06ceb42cfdc154fd0baf7b
SHA512 533080cd1ec40b8530cad5c9914e0a5156d225f7392283ed2607eda4f1db4a6930002274060ed9130a6f634222c2e15818e16a50579cfe7f5274d028d31212f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 5ecf563b3cd4f3fefc8227181b34d769
SHA1 a8b8a484ddd51de63d153f574db64716c390183a
SHA256 f2597d3211724c7b962ab4b3db613186c1084c038f0b8fd0937da60b3302321f
SHA512 6bc672ed61ca794cb7877930500d708b3f90395a3d18011842bec396167d7fff00a707c092afeeedb92d3f0258f8a3b76662dbaf40daf4f7056ea42833595d1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 275115e25c485f44100b7ae975466e47
SHA1 d6eb5dbc63473d362931b5c08574f7ec39344396
SHA256 bfbe58ee0b8c02c86b0b35a84a9e4164b6334e8d15a02ec6b5c32e3e3cc45e9e
SHA512 9585a6656c2a538567344a1cabbdd5054f0cafbc133418a49188a2157849866b8088b4073c4b0542640b9bbe2db09406ad8ece52c446906bf8f098a0dd843baa

C:\Users\Admin\AppData\Local\Temp\Cab3582.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

memory/2536-45-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2536-46-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2536-47-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2176-49-0x0000000000220000-0x00000000002B2000-memory.dmp

memory/2536-51-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2536-54-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2536-53-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2536-55-0x0000000000400000-0x0000000000537000-memory.dmp