Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 18:39

General

  • Target

    4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe

  • Size

    832KB

  • MD5

    4173146820be8f17a7e9844eb5ece68e

  • SHA1

    fb3d4d36f0cfa19c30bb45459aec670168122a6f

  • SHA256

    79fed2e5e69917f98a8b508a772a6bd95a3f0ab84d27998e9e23f66db1aae06f

  • SHA512

    3abf44530e68c51415ad75afcd391bb5fb272671718a799b86b99226bb124a6c86ccfd087b4bb477f4425ff50d66abdf0cb562cced914030b9b853b44810f999

  • SSDEEP

    24576:HGZEEavMjfaZpl08b0PJzxWugguPodMdu95nuH:m4vMjfgpSNPJzCLPeMdGn

Malware Config

Extracted

Family

djvu

C2

http://astdg.top/fhsgtsspen6/get.php

Attributes
  • extension

    .reqg

  • offline_id

    ioYmb0jtMMtue7xjmkS3WQWGWLR8FTQhb2giQtt1

  • payload_url

    http://securebiz.org/dl/build2.exe

    http://astdg.top/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-jTbSQT8ApY Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0324gDrgo

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Renames multiple (154) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3352
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2144
      • C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4776
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 568
            5⤵
            • Program crash
            PID:3156
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 4776
    1⤵
      PID:4932
    • C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe --Task
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe --Task
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

      Filesize

      1KB

      MD5

      67e486b2f148a3fca863728242b6273e

      SHA1

      452a84c183d7ea5b7c015b597e94af8eef66d44a

      SHA256

      facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

      SHA512

      d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

      Filesize

      436B

      MD5

      971c514f84bba0785f80aa1c23edfd79

      SHA1

      732acea710a87530c6b08ecdf32a110d254a54c8

      SHA256

      f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

      SHA512

      43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

      Filesize

      174B

      MD5

      d551a932ffefb67ae9c03a08442e362d

      SHA1

      6bc8b08f5c568775d63cae13a97de351504d1c0b

      SHA256

      03d04a6a2cdc6320f1cf10817dc5a012a5ba38afe51f90a31daa710bba22b513

      SHA512

      cbfa76d99c2dd2f8c441ad0909e4d5ca827eab41c08d7e09c371937e4bc2ff89ef903af4225786af68e48346c3a65210e4876ae872f824ff03dfd65b0be5a129

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

      Filesize

      170B

      MD5

      5dbd9743944e9350d44ab772805fc7d0

      SHA1

      e77f48b55ace14a3a4b1b50f1a50a0321ddce92f

      SHA256

      8d1d0921d16d28a019383c92260e80dbb0858b017b4750864a8025bb23d9607e

      SHA512

      0c77b6b5a102f2fd341ccfa680c13ffe54b4219483afe53e3049347ee180f1483f5d41d469842a9ef2f3ac3f33217fce576745abdaf2b287209c0f7c20deb59c

    • C:\Users\Admin\AppData\Local\80043b8b-53ef-4fef-a9e7-4fa4a50e212d\4173146820be8f17a7e9844eb5ece68e_JaffaCakes118.exe

      Filesize

      832KB

      MD5

      4173146820be8f17a7e9844eb5ece68e

      SHA1

      fb3d4d36f0cfa19c30bb45459aec670168122a6f

      SHA256

      79fed2e5e69917f98a8b508a772a6bd95a3f0ab84d27998e9e23f66db1aae06f

      SHA512

      3abf44530e68c51415ad75afcd391bb5fb272671718a799b86b99226bb124a6c86ccfd087b4bb477f4425ff50d66abdf0cb562cced914030b9b853b44810f999

    • memory/720-2-0x0000000000E00000-0x0000000000F1B000-memory.dmp

      Filesize

      1.1MB

    • memory/720-1-0x0000000000C50000-0x0000000000CF1000-memory.dmp

      Filesize

      644KB

    • memory/3352-3-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3352-4-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3352-5-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3352-6-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3352-21-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-43-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-36-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-44-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-46-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-48-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-49-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4288-359-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4488-25-0x0000000000400000-0x0000000000987000-memory.dmp

      Filesize

      5.5MB

    • memory/4488-29-0x0000000000400000-0x0000000000987000-memory.dmp

      Filesize

      5.5MB

    • memory/4776-24-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4776-28-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4776-26-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB