Analysis

  • max time kernel
    146s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 01:13

General

  • Target

    488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe

  • Size

    735KB

  • MD5

    e02fd1eee5d9fc50ac508abf6896982e

  • SHA1

    7c93d2e15ef9201a6f7154f924f2acd05b62511c

  • SHA256

    488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779

  • SHA512

    1e78d958c25e41b217b0b5ac97b5fa0c643a6d8a997314d8d531372e497357e863792446bd812228d9a1b4aec054be3504d8337df6515535c69efca0e0bd6314

  • SSDEEP

    12288:T4wbKp60OwVHlsiOnNjS9zVy4sn232h2kkjo7UModgPcBJa0sQtaG4l:TLp0OwjiN25VJsnkkkk7s/tTtaGw

Malware Config

Extracted

Family

djvu

C2

http://ring2.ug/As73yhsyU34578hxxx1/SDf565g/get.php

Attributes
  • extension

    .reha

  • offline_id

    7757TLxCRXnSjhJoq4TruFpvTlag0OKn6hPITYt1

  • payload_url

    http://ring2.ug/files/cost/updatewin1.exe

    http://ring2.ug/files/cost/updatewin2.exe

    http://ring2.ug/files/cost/updatewin.exe

    http://ring2.ug/files/cost/3.exe

    http://ring2.ug/files/cost/4.exe

    http://ring2.ug/files/cost/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-UdTNsLeiJA Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0199a7d6a8sda

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 8 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 34 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe
    "C:\Users\Admin\AppData\Local\Temp\488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 832
      2⤵
      • Program crash
      PID:2680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 832
      2⤵
      • Program crash
      PID:3492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 832
      2⤵
      • Program crash
      PID:4272
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 924
      2⤵
      • Program crash
      PID:4072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 984
      2⤵
      • Program crash
      PID:4576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 988
      2⤵
      • Program crash
      PID:788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1552
      2⤵
      • Program crash
      PID:4024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1608
      2⤵
      • Program crash
      PID:4868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1804
      2⤵
      • Program crash
      PID:1316
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1624
      2⤵
      • Program crash
      PID:984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1612
      2⤵
      • Program crash
      PID:2240
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1776
      2⤵
      • Program crash
      PID:2740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1784
      2⤵
      • Program crash
      PID:2856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1840
      2⤵
      • Program crash
      PID:1760
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\48d4793f-a709-4bed-993b-8d40f0bde6eb" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:4932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1804
      2⤵
      • Program crash
      PID:5076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 2040
      2⤵
      • Program crash
      PID:1036
    • C:\Users\Admin\AppData\Local\Temp\488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe
      "C:\Users\Admin\AppData\Local\Temp\488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 792
        3⤵
        • Program crash
        PID:824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 800
        3⤵
        • Program crash
        PID:556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 884
        3⤵
        • Program crash
        PID:1412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 924
        3⤵
        • Program crash
        PID:1084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1064
        3⤵
        • Program crash
        PID:1256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1084
        3⤵
        • Program crash
        PID:3508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1328
        3⤵
        • Program crash
        PID:2824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1572
        3⤵
        • Program crash
        PID:4768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1656
        3⤵
        • Program crash
        PID:688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1684
        3⤵
        • Program crash
        PID:4320
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1584
        3⤵
        • Program crash
        PID:3420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1692
        3⤵
        • Program crash
        PID:1932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1692
        3⤵
        • Program crash
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1756
        3⤵
        • Program crash
        PID:60
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1548
        3⤵
        • Program crash
        PID:3692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1776
        3⤵
        • Program crash
        PID:32
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 836
        3⤵
        • Program crash
        PID:4208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1772
      2⤵
      • Program crash
      PID:2712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4028 -ip 4028
    1⤵
      PID:5092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4028 -ip 4028
      1⤵
        PID:4076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4028 -ip 4028
        1⤵
          PID:668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4028 -ip 4028
          1⤵
            PID:2804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4028 -ip 4028
            1⤵
              PID:3316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4028 -ip 4028
              1⤵
                PID:3472
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4028 -ip 4028
                1⤵
                  PID:4800
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4028 -ip 4028
                  1⤵
                    PID:4220
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4028 -ip 4028
                    1⤵
                      PID:4900
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4028 -ip 4028
                      1⤵
                        PID:1180
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4028 -ip 4028
                        1⤵
                          PID:1028
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4028 -ip 4028
                          1⤵
                            PID:3136
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4028 -ip 4028
                            1⤵
                              PID:2028
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4028 -ip 4028
                              1⤵
                                PID:1340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3776,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:8
                                1⤵
                                  PID:2896
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4028 -ip 4028
                                  1⤵
                                    PID:4064
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4028 -ip 4028
                                    1⤵
                                      PID:772
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4028 -ip 4028
                                      1⤵
                                        PID:4432
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3700 -ip 3700
                                        1⤵
                                          PID:4580
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3700 -ip 3700
                                          1⤵
                                            PID:4892
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3700 -ip 3700
                                            1⤵
                                              PID:2648
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3700 -ip 3700
                                              1⤵
                                                PID:1520
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3700 -ip 3700
                                                1⤵
                                                  PID:4108
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3700 -ip 3700
                                                  1⤵
                                                    PID:4888
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3700 -ip 3700
                                                    1⤵
                                                      PID:3536
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3700 -ip 3700
                                                      1⤵
                                                        PID:2212
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3700 -ip 3700
                                                        1⤵
                                                          PID:3780
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3700 -ip 3700
                                                          1⤵
                                                            PID:896
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3700 -ip 3700
                                                            1⤵
                                                              PID:2208
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3700 -ip 3700
                                                              1⤵
                                                                PID:232
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3700 -ip 3700
                                                                1⤵
                                                                  PID:2808
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3700 -ip 3700
                                                                  1⤵
                                                                    PID:4216
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3700 -ip 3700
                                                                    1⤵
                                                                      PID:640
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 3700 -ip 3700
                                                                      1⤵
                                                                        PID:2804
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3700 -ip 3700
                                                                        1⤵
                                                                          PID:3080

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          7fb5fa1534dcf77f2125b2403b30a0ee

                                                                          SHA1

                                                                          365d96812a69ac0a4611ea4b70a3f306576cc3ea

                                                                          SHA256

                                                                          33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

                                                                          SHA512

                                                                          a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                                          Filesize

                                                                          436B

                                                                          MD5

                                                                          971c514f84bba0785f80aa1c23edfd79

                                                                          SHA1

                                                                          732acea710a87530c6b08ecdf32a110d254a54c8

                                                                          SHA256

                                                                          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                                          SHA512

                                                                          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                          Filesize

                                                                          174B

                                                                          MD5

                                                                          b31491f55c7f3585878134e14583547d

                                                                          SHA1

                                                                          1a7a0f523d437f16dd80731ccf336514386a1c2d

                                                                          SHA256

                                                                          2646aa8a97d59471d8b0ee638373b4c6c93fc5f8729768ef2fc2506668a35023

                                                                          SHA512

                                                                          889a10e386d260aa49b05006910008f1aaa01122fb64cc991f7178ad6ebece7923cce1de2737201ac42b65b289bfa42b8792eca1e17ead401478da60d7502361

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                                          Filesize

                                                                          170B

                                                                          MD5

                                                                          626fa162619b2dae0eaf3cbda4ec84b0

                                                                          SHA1

                                                                          5309767c6e9bb78d0e69eaab205a177a79883262

                                                                          SHA256

                                                                          eec46f0f3016c1a9459523d3899d28dce356a1cd0a139b63eff6f0523efe5d5b

                                                                          SHA512

                                                                          eb06feae6ca5f6c0360f9ba841d3ea5e78c1ba7cd26e05967329c0d6a1e14992a689242e718d4ad5a6662de654894b6b7b734ef8c81ed696ce87ef215b20df8f

                                                                        • C:\Users\Admin\AppData\Local\48d4793f-a709-4bed-993b-8d40f0bde6eb\488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe

                                                                          Filesize

                                                                          735KB

                                                                          MD5

                                                                          e02fd1eee5d9fc50ac508abf6896982e

                                                                          SHA1

                                                                          7c93d2e15ef9201a6f7154f924f2acd05b62511c

                                                                          SHA256

                                                                          488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779

                                                                          SHA512

                                                                          1e78d958c25e41b217b0b5ac97b5fa0c643a6d8a997314d8d531372e497357e863792446bd812228d9a1b4aec054be3504d8337df6515535c69efca0e0bd6314

                                                                        • memory/3700-15-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3700-23-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3700-27-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/3700-28-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4028-18-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4028-17-0x0000000000B80000-0x0000000000C9A000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/4028-1-0x00000000009D0000-0x0000000000A67000-memory.dmp

                                                                          Filesize

                                                                          604KB

                                                                        • memory/4028-3-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                          Filesize

                                                                          1.2MB

                                                                        • memory/4028-2-0x0000000000B80000-0x0000000000C9A000-memory.dmp

                                                                          Filesize

                                                                          1.1MB