Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 05:45

General

  • Target

    2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe

  • Size

    809KB

  • MD5

    2f2dec2988f4a4984494b55154b09bd8

  • SHA1

    89f05debffdf11fa7c0761698067e59afa08375b

  • SHA256

    0bdb5e571aefdfb8c27968b20aee1dbf0ec2ea1124f49efeec79a325f010923b

  • SHA512

    e0407480fb45d76442baec48ecc74a49ef6a19e718e35dc605538e5eb05a46c4e96ed4a0bac076be77e8fbe727e1ddb01f9eb7d7bdfff17358eed136f2dd1b02

  • SSDEEP

    24576:+uRdnQWxsSK0qz9ArzAEK0vz5W4MHwW2+836L:+uDxBqz9av/t7fWf

Malware Config

Extracted

Family

djvu

C2

http://securebiz.org/fhsgtsspen6/get.php

Attributes
  • extension

    .tisc

  • offline_id

    uFHwN7bjwCkJEeUg8JHISzLqrwudidH8XsPzHDt1

  • payload_url

    http://znpst.top/dl/build2.exe

    http://securebiz.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-1JwFK5rT39 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0336gSd743d

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 15 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\6b7877a8-ddd2-4f80-bf5a-1e1f45401193" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2836
      • C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    1bfe0a81db078ea084ff82fe545176fe

    SHA1

    50b116f578bd272922fa8eae94f7b02fd3b88384

    SHA256

    5ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f

    SHA512

    37c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    af2e3f56cccf0c461d6c9cfc8cab5651

    SHA1

    13747e641d5e46b61acb247f2ced01e2a9af7805

    SHA256

    a9cbe13ce115cf7381e6869b7152fa8c11f4c4da15c3cbbb329aba440ddd0ab7

    SHA512

    a6a82ae26a73bf9ae330feead115f215234f7a482af19a4b58fec56aab31d2ddc44d217127a1304ec1d126d337c936f29102d611df2556b6589dead13bacba0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4960964330252b767f0b9ba84b1925a

    SHA1

    4aba52e2a0c8fa8ee021237156c4048d0009d9da

    SHA256

    97be543603b5a9272d726609b3395e16dabaa56bf6737cd7484111135325c95e

    SHA512

    45b4a6e0ff5ec51d5d045ed87777531537cba5cb3646bfbbc22da9af8b74a5791079651734abdbe66f22e8e83f79644a4525ceeec6eaff6e99c21cf67c00d401

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    c592be380a8e171ad5994ff2fa442abd

    SHA1

    cc562326f8b100d5a566e05a427931156a703a5e

    SHA256

    97892b3e5873ee28cd00c751ea85da7c45f1569ce2bf33ef6d1fa15c07ed0d91

    SHA512

    a06c7dcd9df876d6b32387d87ee41c0479f413a1eb991d27b990d601c9f03111cc6e7bc8a4d082ed41a1d7fbdd499b19b97488d9db173a934c4fbf28c112fe9f

  • C:\Users\Admin\AppData\Local\6b7877a8-ddd2-4f80-bf5a-1e1f45401193\2f2dec2988f4a4984494b55154b09bd8_JaffaCakes118.exe

    Filesize

    809KB

    MD5

    2f2dec2988f4a4984494b55154b09bd8

    SHA1

    89f05debffdf11fa7c0761698067e59afa08375b

    SHA256

    0bdb5e571aefdfb8c27968b20aee1dbf0ec2ea1124f49efeec79a325f010923b

    SHA512

    e0407480fb45d76442baec48ecc74a49ef6a19e718e35dc605538e5eb05a46c4e96ed4a0bac076be77e8fbe727e1ddb01f9eb7d7bdfff17358eed136f2dd1b02

  • C:\Users\Admin\AppData\Local\Temp\Cab558F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • memory/1656-6-0x0000000000550000-0x00000000005E1000-memory.dmp

    Filesize

    580KB

  • memory/1656-0-0x0000000000550000-0x00000000005E1000-memory.dmp

    Filesize

    580KB

  • memory/1656-1-0x0000000000550000-0x00000000005E1000-memory.dmp

    Filesize

    580KB

  • memory/1656-2-0x0000000000630000-0x000000000074B000-memory.dmp

    Filesize

    1.1MB

  • memory/2336-39-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2336-31-0x0000000000220000-0x00000000002B1000-memory.dmp

    Filesize

    580KB

  • memory/2336-33-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2640-56-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-59-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-40-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-65-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-38-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-64-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-63-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-61-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-55-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2640-57-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2820-9-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2820-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2820-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2820-8-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2820-32-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB