Malware Analysis Report

2024-10-19 01:49

Sample ID 240523-dc4tfsbc7t
Target 0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb
SHA256 0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb
Tags
djvu discovery persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb

Threat Level: Known bad

The file 0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb was found to be: Known bad.

Malicious Activity Summary

djvu discovery persistence ransomware

Detected Djvu ransomware

Djvu Ransomware

Modifies file permissions

Checks computer location settings

Adds Run key to start application

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-23 02:52

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 02:52

Reported

2024-05-23 02:55

Platform

win10v2004-20240508-en

Max time kernel

141s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\92a43025-1d04-48e3-b4ee-01edda4437b5\\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 2672 wrote to memory of 4836 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 4836 wrote to memory of 4120 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 4836 wrote to memory of 4120 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 4836 wrote to memory of 4120 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 4836 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 4836 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 4836 wrote to memory of 3116 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3116 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\92a43025-1d04-48e3-b4ee-01edda4437b5" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 104.21.65.24:443 api.2ip.ua tcp
US 8.8.8.8:53 24.65.21.104.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 104.21.65.24:443 api.2ip.ua tcp
US 8.8.8.8:53 sdfjhuz.com udp
US 8.8.8.8:53 cajgtus.com udp
US 8.8.8.8:53 g.bing.com udp
JM 63.143.98.185:80 cajgtus.com tcp
US 204.79.197.237:443 g.bing.com tcp
SI 93.103.167.123:80 sdfjhuz.com tcp
JM 63.143.98.185:80 cajgtus.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 123.167.103.93.in-addr.arpa udp
US 8.8.8.8:53 185.98.143.63.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
JM 63.143.98.185:80 cajgtus.com tcp
JM 63.143.98.185:80 cajgtus.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
JM 63.143.98.185:80 cajgtus.com tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp

Files

memory/2672-1-0x0000000004970000-0x0000000004A11000-memory.dmp

memory/2672-2-0x0000000004A20000-0x0000000004B3B000-memory.dmp

memory/4836-3-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4836-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4836-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4836-6-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\92a43025-1d04-48e3-b4ee-01edda4437b5\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

MD5 2fe74589699ad8b98b23c473414a5c6a
SHA1 84b1ab6c53ce76ca7c8710a3fc943f12c260adaa
SHA256 0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb
SHA512 2a473345343ee3869687cdde79921f9c6c9300d65e14056ad63788dd2459883c65ada384d15f6cc66ff09763ac52703314efba8175acba90ba0f8623be5350b5

memory/4836-19-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-22-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 31ab6432a43361d81da1de1aa0a18330
SHA1 5f8743afc92567fc6d291dbc06004ae2f536a2b0
SHA256 bba1d72e95bf9b87d5f3ce1a72d1f9db833cd80273f068eae6b2544338e2af9f
SHA512 ed4166d5b0e10cfa991008775058d61d84147fcfadf4d91712c106a88df2de1c85d3ce059d0b662cece2716ed7277a70de91d068e2b1af780d7caab601fd1024

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 7575c39a544943a68ce6e709c586005a
SHA1 4874b30bd1d455b28a95c4e21c5aecd1ea043d7a
SHA256 4737de49245ace1ca1fdeaacd5feee9bbda88bc6f42c84a1ea7d316383792cf8
SHA512 abf3d85393725113e720cbe8980b369236511e3984e8cbfa795f19bb5d6e39822e80a835caeb498581797a74b349765ba1a27f26586a17a66ae1c88bd066a3d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 cf346c75fc8adc976260ed91ffc4790e
SHA1 2f254e0086fa7c6cc8c2e7668f043ee98b37cfb6
SHA256 8f0803441160e3e1e05d1bcea12b793d3687ff6b807f8ec02f0da1aaef46ff26
SHA512 de6b353710f9a162331e968a87403da25059bdc78df543ddd191de1934eb3f5e0e026214b67ea7e00514f2c22f1c26a551f7e35d0d9f360acdf8e9093e945a8a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

memory/4512-27-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-28-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-29-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-32-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-35-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-36-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4512-37-0x0000000000400000-0x0000000000537000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 02:52

Reported

2024-05-23 02:55

Platform

win11-20240426-en

Max time kernel

144s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f131942c-7c59-4152-bc4c-ff8a9235187b\\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 1788 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3020 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 3020 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 3020 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Windows\SysWOW64\icacls.exe
PID 3020 wrote to memory of 848 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3020 wrote to memory of 848 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 3020 wrote to memory of 848 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe
PID 848 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\f131942c-7c59-4152-bc4c-ff8a9235187b" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

"C:\Users\Admin\AppData\Local\Temp\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe" --Admin IsNotAutoStart IsNotTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.2ip.ua udp
US 104.21.65.24:443 api.2ip.ua tcp
US 8.8.8.8:53 24.65.21.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 104.21.65.24:443 api.2ip.ua tcp
JM 63.143.98.185:80 cajgtus.com tcp
BA 31.176.195.237:80 sdfjhuz.com tcp
JM 63.143.98.185:80 cajgtus.com tcp
JM 63.143.98.185:80 cajgtus.com tcp
JM 63.143.98.185:80 cajgtus.com tcp
JM 63.143.98.185:80 cajgtus.com tcp

Files

memory/1788-1-0x0000000004A10000-0x0000000004AB1000-memory.dmp

memory/1788-2-0x0000000004AC0000-0x0000000004BDB000-memory.dmp

memory/3020-4-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3020-5-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3020-6-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3020-3-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\f131942c-7c59-4152-bc4c-ff8a9235187b\0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb.exe

MD5 2fe74589699ad8b98b23c473414a5c6a
SHA1 84b1ab6c53ce76ca7c8710a3fc943f12c260adaa
SHA256 0f5bae947e7f1d88edbea521ebd44f9712a4cd63176b79258816d4135fae48fb
SHA512 2a473345343ee3869687cdde79921f9c6c9300d65e14056ad63788dd2459883c65ada384d15f6cc66ff09763ac52703314efba8175acba90ba0f8623be5350b5

memory/3020-19-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-22-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 8202a1cd02e7d69597995cabbe881a12
SHA1 8858d9d934b7aa9330ee73de6c476acf19929ff6
SHA256 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA512 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 97b34eb802f6843c1079951f1b537f66
SHA1 f169349c0bf5b70e7e54f3a3b12543b81898d935
SHA256 59bc81143d8b4cd785b6324c19bec4dffcebd4706a61b83dc63ac7e96b2a10d3
SHA512 fbf393eb25d63e32a73f42222e4057a45fb304339e0d47600b0fa1c8a43c11e6294f5e89563930d60b8a8e4b77a6e9e03f84c525e50a07fa72935fde4ae06d75

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 7575c39a544943a68ce6e709c586005a
SHA1 4874b30bd1d455b28a95c4e21c5aecd1ea043d7a
SHA256 4737de49245ace1ca1fdeaacd5feee9bbda88bc6f42c84a1ea7d316383792cf8
SHA512 abf3d85393725113e720cbe8980b369236511e3984e8cbfa795f19bb5d6e39822e80a835caeb498581797a74b349765ba1a27f26586a17a66ae1c88bd066a3d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 21190b226eea4531c925900d8ca8de01
SHA1 858e19bbd2c4a82a2f741d54f7702ef13f412133
SHA256 0939c502dc7989a054ccc4828af7696111edbf6ac3092aef7c9b576a87ff53b2
SHA512 ce500f3a31abf920ceba0b6a61dd05af145c43f2e05389a454b9f6ffdabd944a5bc8ec7cb2a8605349e131da23e6b69df7e93f7b1d9102f0fab7d6cee01ba6c0

memory/3392-27-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-28-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-29-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-32-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-34-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-35-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-36-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3392-37-0x0000000000400000-0x0000000000537000-memory.dmp