Analysis

  • max time kernel
    146s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 12:31

General

  • Target

    e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe

  • Size

    735KB

  • MD5

    e02fd1eee5d9fc50ac508abf6896982e

  • SHA1

    7c93d2e15ef9201a6f7154f924f2acd05b62511c

  • SHA256

    488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779

  • SHA512

    1e78d958c25e41b217b0b5ac97b5fa0c643a6d8a997314d8d531372e497357e863792446bd812228d9a1b4aec054be3504d8337df6515535c69efca0e0bd6314

  • SSDEEP

    12288:T4wbKp60OwVHlsiOnNjS9zVy4sn232h2kkjo7UModgPcBJa0sQtaG4l:TLp0OwjiN25VJsnkkkk7s/tTtaGw

Malware Config

Extracted

Family

djvu

C2

http://ring2.ug/As73yhsyU34578hxxx1/SDf565g/get.php

Attributes
  • extension

    .reha

  • offline_id

    7757TLxCRXnSjhJoq4TruFpvTlag0OKn6hPITYt1

  • payload_url

    http://ring2.ug/files/cost/updatewin1.exe

    http://ring2.ug/files/cost/updatewin2.exe

    http://ring2.ug/files/cost/updatewin.exe

    http://ring2.ug/files/cost/3.exe

    http://ring2.ug/files/cost/4.exe

    http://ring2.ug/files/cost/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-UdTNsLeiJA Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0199a7d6a8sda

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 832
      2⤵
      • Program crash
      PID:4188
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 872
      2⤵
      • Program crash
      PID:2116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 872
      2⤵
      • Program crash
      PID:2008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 848
      2⤵
      • Program crash
      PID:4936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 984
      2⤵
      • Program crash
      PID:1904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 992
      2⤵
      • Program crash
      PID:2664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1524
      2⤵
      • Program crash
      PID:3684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1536
      2⤵
      • Program crash
      PID:4228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1804
      2⤵
      • Program crash
      PID:1532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1596
      2⤵
      • Program crash
      PID:1152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1628
      2⤵
      • Program crash
      PID:4308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1584
      2⤵
      • Program crash
      PID:724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1820
      2⤵
      • Program crash
      PID:2440
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\04ea52be-619b-4a9a-bbfd-ae798be2baea" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:3812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1584
      2⤵
      • Program crash
      PID:4512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 2096
      2⤵
      • Program crash
      PID:1088
    • C:\Users\Admin\AppData\Local\Temp\e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 792
        3⤵
        • Program crash
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 812
        3⤵
        • Program crash
        PID:5108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 896
        3⤵
        • Program crash
        PID:2152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 904
        3⤵
        • Program crash
        PID:2360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1036
        3⤵
        • Program crash
        PID:4260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1084
        3⤵
        • Program crash
        PID:2208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1336
        3⤵
        • Program crash
        PID:1860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1568
        3⤵
        • Program crash
        PID:3912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1640
        3⤵
        • Program crash
        PID:1512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1664
        3⤵
        • Program crash
        PID:4028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1696
        3⤵
        • Program crash
        PID:624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1728
        3⤵
        • Program crash
        PID:2980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1656
        3⤵
        • Program crash
        PID:2084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1672
        3⤵
        • Program crash
        PID:4860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1556
        3⤵
        • Program crash
        PID:2804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1760
        3⤵
        • Program crash
        PID:2832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 796
        3⤵
        • Program crash
        PID:1544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 1864
      2⤵
      • Program crash
      PID:3260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1884 -ip 1884
    1⤵
      PID:1696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1884 -ip 1884
      1⤵
        PID:3092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1884 -ip 1884
        1⤵
          PID:4952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1884 -ip 1884
          1⤵
            PID:3648
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1884 -ip 1884
            1⤵
              PID:4120
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1884 -ip 1884
              1⤵
                PID:2792
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1884 -ip 1884
                1⤵
                  PID:2928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1884 -ip 1884
                  1⤵
                    PID:1584
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1884 -ip 1884
                    1⤵
                      PID:2940
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1884 -ip 1884
                      1⤵
                        PID:1796
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1884 -ip 1884
                        1⤵
                          PID:2960
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1884 -ip 1884
                          1⤵
                            PID:5016
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1884 -ip 1884
                            1⤵
                              PID:4452
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1884 -ip 1884
                              1⤵
                                PID:2828
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1884 -ip 1884
                                1⤵
                                  PID:2132
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1884 -ip 1884
                                  1⤵
                                    PID:3668
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 208 -ip 208
                                    1⤵
                                      PID:1344
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 208 -ip 208
                                      1⤵
                                        PID:3400
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 208 -ip 208
                                        1⤵
                                          PID:3436
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 208 -ip 208
                                          1⤵
                                            PID:2192
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 208 -ip 208
                                            1⤵
                                              PID:988
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 208 -ip 208
                                              1⤵
                                                PID:2548
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 208 -ip 208
                                                1⤵
                                                  PID:1644
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 208 -ip 208
                                                  1⤵
                                                    PID:528
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 208 -ip 208
                                                    1⤵
                                                      PID:4352
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 208 -ip 208
                                                      1⤵
                                                        PID:4524
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 208 -ip 208
                                                        1⤵
                                                          PID:4888
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 208 -ip 208
                                                          1⤵
                                                            PID:1936
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 208 -ip 208
                                                            1⤵
                                                              PID:2168
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 208 -ip 208
                                                              1⤵
                                                                PID:4380
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 208 -ip 208
                                                                1⤵
                                                                  PID:1632
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 208 -ip 208
                                                                  1⤵
                                                                    PID:1152
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 208 -ip 208
                                                                    1⤵
                                                                      PID:2208

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      7fb5fa1534dcf77f2125b2403b30a0ee

                                                                      SHA1

                                                                      365d96812a69ac0a4611ea4b70a3f306576cc3ea

                                                                      SHA256

                                                                      33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

                                                                      SHA512

                                                                      a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                                      Filesize

                                                                      436B

                                                                      MD5

                                                                      971c514f84bba0785f80aa1c23edfd79

                                                                      SHA1

                                                                      732acea710a87530c6b08ecdf32a110d254a54c8

                                                                      SHA256

                                                                      f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                                      SHA512

                                                                      43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                      Filesize

                                                                      174B

                                                                      MD5

                                                                      ea60cbb7aae21b2509e20532bb028362

                                                                      SHA1

                                                                      1f936d5d9cda93a707dc604bb6f028387f017023

                                                                      SHA256

                                                                      1546328e38f7c475a73b52bee0ad75647aed19d844a67d6dac2277f044f2c874

                                                                      SHA512

                                                                      26e1e535c299a9bfe068424ac0605927add88a2f0bd2af7e7abc8405ffbb3a18987b7c89afb04e39f3fb5d091a23422ab0bb12f4c7b517e0039116003d49a108

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                                      Filesize

                                                                      170B

                                                                      MD5

                                                                      9131588d8bfc5eb25b9cba78839d300f

                                                                      SHA1

                                                                      f4224adafc3a19998b3dffcea73a37d97a6aea5e

                                                                      SHA256

                                                                      a923b8b5d69434c7b9af119fb2465eec45851791eede9a26bb86227460ce557a

                                                                      SHA512

                                                                      6625f5b5b9c6f11b445725f282a7882a19c1a3cd3e1d56afdedb3bf2168a2bf4a8404ecadbf1339ea7fceef6f6d1414f44930aaa9ca7e63f0b77a360f162fb26

                                                                    • C:\Users\Admin\AppData\Local\04ea52be-619b-4a9a-bbfd-ae798be2baea\e02fd1eee5d9fc50ac508abf6896982e_JaffaCakes118.exe

                                                                      Filesize

                                                                      735KB

                                                                      MD5

                                                                      e02fd1eee5d9fc50ac508abf6896982e

                                                                      SHA1

                                                                      7c93d2e15ef9201a6f7154f924f2acd05b62511c

                                                                      SHA256

                                                                      488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779

                                                                      SHA512

                                                                      1e78d958c25e41b217b0b5ac97b5fa0c643a6d8a997314d8d531372e497357e863792446bd812228d9a1b4aec054be3504d8337df6515535c69efca0e0bd6314

                                                                    • memory/208-15-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/208-17-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/208-27-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/208-31-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/208-32-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1884-16-0x00000000009E0000-0x0000000000A7D000-memory.dmp

                                                                      Filesize

                                                                      628KB

                                                                    • memory/1884-20-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1884-19-0x0000000000AD0000-0x0000000000BEA000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1884-1-0x00000000009E0000-0x0000000000A7D000-memory.dmp

                                                                      Filesize

                                                                      628KB

                                                                    • memory/1884-3-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1884-2-0x0000000000AD0000-0x0000000000BEA000-memory.dmp

                                                                      Filesize

                                                                      1.1MB