Analysis

  • max time kernel
    1s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 17:26

General

  • Target

    232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe

  • Size

    834KB

  • MD5

    20741efb92edd220de77c9e7e59b6c29

  • SHA1

    61091ff70842a709c0283253be9b0e473bfa1054

  • SHA256

    232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b

  • SHA512

    fb66a40b9e65c73f525dcf4ca9c8a3eb3411aa4bee584fc6138ab4a8fba88cdc9cfeec26fe6c3dc38d18d6a8a8af550471d1bb6ef087433124c3898fb4b8f691

  • SSDEEP

    12288:e8K0AkD/lct8fzQooO2Q8u62R0qP/8WnFJ7VVrEXrS/8rZ5qtLgq0nFcjV7u:tu+OteztV8AdlY7Algq0nFJ

Malware Config

Extracted

Family

djvu

C2

http://fuyt.org/test1/get.php

Attributes
  • extension

    .iiof

  • offline_id

    rpx4UUTYZiAR5omq187UvM233jloVHyJUkA8s3t1

  • payload_url

    http://zerit.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-hsmBOFHh66 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0410Jsfkjn

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 18 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe
    "C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\XrmUTb.exe
      C:\Users\Admin\AppData\Local\Temp\XrmUTb.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1108
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\438119a0.bat" "
        3⤵
          PID:4396
      • C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe
        "C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\6e2b7937-2ac4-42d6-95da-7f0fc6cdcc55" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:2896
        • C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe
          "C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
            PID:2212
            • C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe
              "C:\Users\Admin\AppData\Local\Temp\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe" --Admin IsNotAutoStart IsNotTask
              4⤵
                PID:2296

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          7fb5fa1534dcf77f2125b2403b30a0ee

          SHA1

          365d96812a69ac0a4611ea4b70a3f306576cc3ea

          SHA256

          33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

          SHA512

          a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          971c514f84bba0785f80aa1c23edfd79

          SHA1

          732acea710a87530c6b08ecdf32a110d254a54c8

          SHA256

          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

          SHA512

          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          901f823d20a5de405c095fb4acd9d213

          SHA1

          142339411c31e26ed4d838257657920fd277ed49

          SHA256

          12da885ab2c37a8110368e6946a5f45264d391a195941a397474fb2db9e7c058

          SHA512

          28c09174aebfab7860a90f532355fe5175c9ccf8da0e9c4cceceff687ffaa1438ba66485fd2a525e5114564a7b9996962e651a8e1bee15cad018ad073c08dad2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          57b094ba1f2b91396295a76f7fb51df7

          SHA1

          86aad62ae8a1a17aede45794a00512deb2f38d87

          SHA256

          d2657654fb1355bef54d6ae5eba0b99f8dde0b61d85975e375d48f1d49c10fab

          SHA512

          27338fb31ccf8d0a29145cad0ed32688af43efe3fc077268b432f1a4ec33ab640ef161b0c77ade2861bac5710d30946ab38e75d68130d11f2737b87b5036fb26

        • C:\Users\Admin\AppData\Local\6e2b7937-2ac4-42d6-95da-7f0fc6cdcc55\232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b.exe

          Filesize

          834KB

          MD5

          20741efb92edd220de77c9e7e59b6c29

          SHA1

          61091ff70842a709c0283253be9b0e473bfa1054

          SHA256

          232d25948db02a80f05a71382a8fda0000fb08df82778f30322d5844ce7d167b

          SHA512

          fb66a40b9e65c73f525dcf4ca9c8a3eb3411aa4bee584fc6138ab4a8fba88cdc9cfeec26fe6c3dc38d18d6a8a8af550471d1bb6ef087433124c3898fb4b8f691

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MDMHN06X\k2[1].rar

          Filesize

          4B

          MD5

          d3b07384d113edec49eaa6238ad5ff00

          SHA1

          f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

          SHA256

          b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

          SHA512

          0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

        • C:\Users\Admin\AppData\Local\Temp\438119a0.bat

          Filesize

          187B

          MD5

          e2281774993476c583a6e1cad5c87a32

          SHA1

          b4d8d72b9824b01f2f2bbde6965c48f13a4bef89

          SHA256

          47427dd942498b91b6423f216fe871f54597d14d9d95492793e95434442577bf

          SHA512

          881e7055989f7fd053388acbf68ffa992ce296365d1e4c85e4b206c7b866516ab6804c4923a7fb3170efaa2fd334f8e8b57ef6cdeedb1c279d41eb37a91fffb3

        • C:\Users\Admin\AppData\Local\Temp\687757E3.exe

          Filesize

          4B

          MD5

          20879c987e2f9a916e578386d499f629

          SHA1

          c7b33ddcc42361fdb847036fc07e880b81935d5d

          SHA256

          9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

          SHA512

          bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

        • C:\Users\Admin\AppData\Local\Temp\XrmUTb.exe

          Filesize

          15KB

          MD5

          f7d21de5c4e81341eccd280c11ddcc9a

          SHA1

          d4e9ef10d7685d491583c6fa93ae5d9105d815bd

          SHA256

          4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

          SHA512

          e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

        • memory/1108-5-0x00000000004C0000-0x00000000004C9000-memory.dmp

          Filesize

          36KB

        • memory/1108-77-0x00000000004C0000-0x00000000004C9000-memory.dmp

          Filesize

          36KB

        • memory/2212-68-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/2212-47-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/2212-62-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/2296-65-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-94-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-99-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-98-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-64-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-97-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-80-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-96-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-78-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-67-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-85-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/2296-81-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4532-7-0x00000000021F0000-0x0000000002282000-memory.dmp

          Filesize

          584KB

        • memory/4532-9-0x0000000002290000-0x00000000023AB000-memory.dmp

          Filesize

          1.1MB

        • memory/4532-10-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/4532-1-0x0000000000400000-0x0000000000502000-memory.dmp

          Filesize

          1.0MB

        • memory/4984-45-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4984-12-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4984-11-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4984-13-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB

        • memory/4984-8-0x0000000000400000-0x0000000000537000-memory.dmp

          Filesize

          1.2MB