Analysis

  • max time kernel
    146s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 20:56

General

  • Target

    2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe

  • Size

    869KB

  • MD5

    b61223f5063b9290cb7177e0915be648

  • SHA1

    041b2958f50c016f1d2525848b2e0b3cefad1dc3

  • SHA256

    2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7

  • SHA512

    d492e72bea3996df52eb0631c411e806a9130bc1bc2dea514247f0c834c3316473bbe751dfa6692355d035ee229cb8fe7e5df609af757963d9c4641c35eb589f

  • SSDEEP

    24576:hQxvS/h/e8PZD/PrhkNcW2S4+f8nalYsefFzy:Ovch/pPZ7PrpFJagz

Malware Config

Extracted

Family

djvu

C2

http://jfus.top/nddddhsspen6/get.php

Attributes
  • extension

    .rejg

  • offline_id

    ffMYeEIl8VXTNtDFDB8XTask2PZgkOrOTmhHKet1

  • payload_url

    http://jfus.top/files/penelop/updatewin1.exe

    http://jfus.top/files/penelop/updatewin2.exe

    http://jfus.top/files/penelop/updatewin.exe

    http://jfus.top/files/penelop/3.exe

    http://jfus.top/files/penelop/4.exe

    http://jfus.top/files/penelop/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-t9u4WFnEtN Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0295Sirj

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Djvu family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 29 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe
    "C:\Users\Admin\AppData\Local\Temp\2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 832
      2⤵
      • Program crash
      PID:2328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 840
      2⤵
      • Program crash
      PID:624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 840
      2⤵
      • Program crash
      PID:2956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 864
      2⤵
      • Program crash
      PID:752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 988
      2⤵
      • Program crash
      PID:3892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 864
      2⤵
      • Program crash
      PID:888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1544
      2⤵
      • Program crash
      PID:3856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1632
      2⤵
      • Program crash
      PID:4108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1804
      2⤵
      • Program crash
      PID:744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1584
      2⤵
      • Program crash
      PID:2388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1636
      2⤵
      • Program crash
      PID:952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1632
      2⤵
      • Program crash
      PID:4332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1788
      2⤵
      • Program crash
      PID:4640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1636
      2⤵
      • Program crash
      PID:2864
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\6e2b5cd5-5b08-4dfa-ac48-058bbd1e3504" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:4956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1808
      2⤵
      • Program crash
      PID:4548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2100
      2⤵
      • Program crash
      PID:452
    • C:\Users\Admin\AppData\Local\Temp\2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe
      "C:\Users\Admin\AppData\Local\Temp\2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 792
        3⤵
        • Program crash
        PID:624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 832
        3⤵
        • Program crash
        PID:872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 832
        3⤵
        • Program crash
        PID:5084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 884
        3⤵
        • Program crash
        PID:1880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1004
        3⤵
        • Program crash
        PID:3760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1084
        3⤵
        • Program crash
        PID:2100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1340
        3⤵
        • Program crash
        PID:1208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1572
        3⤵
        • Program crash
        PID:4524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1648
        3⤵
        • Program crash
        PID:744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1664
        3⤵
        • Program crash
        PID:4444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1548
        3⤵
        • Program crash
        PID:2340
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 796
        3⤵
        • Program crash
        PID:2304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1812
      2⤵
      • Program crash
      PID:2008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2232 -ip 2232
    1⤵
      PID:2288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2232 -ip 2232
      1⤵
        PID:3040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2232 -ip 2232
        1⤵
          PID:4120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2232 -ip 2232
          1⤵
            PID:1616
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2232 -ip 2232
            1⤵
              PID:1844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2232 -ip 2232
              1⤵
                PID:2924
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2232 -ip 2232
                1⤵
                  PID:3032
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2232 -ip 2232
                  1⤵
                    PID:1900
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2232 -ip 2232
                    1⤵
                      PID:1788
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2232 -ip 2232
                      1⤵
                        PID:2668
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2232 -ip 2232
                        1⤵
                          PID:3132
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2232 -ip 2232
                          1⤵
                            PID:2040
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2232 -ip 2232
                            1⤵
                              PID:3412
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2232 -ip 2232
                              1⤵
                                PID:2416
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2232 -ip 2232
                                1⤵
                                  PID:4996
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2232 -ip 2232
                                  1⤵
                                    PID:1692
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2232 -ip 2232
                                    1⤵
                                      PID:2680
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2480 -ip 2480
                                      1⤵
                                        PID:3464
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2480 -ip 2480
                                        1⤵
                                          PID:4032
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2480 -ip 2480
                                          1⤵
                                            PID:4004
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2480 -ip 2480
                                            1⤵
                                              PID:3936
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2480 -ip 2480
                                              1⤵
                                                PID:5024
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2480 -ip 2480
                                                1⤵
                                                  PID:2392
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2480 -ip 2480
                                                  1⤵
                                                    PID:4064
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2480 -ip 2480
                                                    1⤵
                                                      PID:4292
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2480 -ip 2480
                                                      1⤵
                                                        PID:4924
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2480 -ip 2480
                                                        1⤵
                                                          PID:4760
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2480 -ip 2480
                                                          1⤵
                                                            PID:1624
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2480 -ip 2480
                                                            1⤵
                                                              PID:4424

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              67e486b2f148a3fca863728242b6273e

                                                              SHA1

                                                              452a84c183d7ea5b7c015b597e94af8eef66d44a

                                                              SHA256

                                                              facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                                                              SHA512

                                                              d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                              Filesize

                                                              436B

                                                              MD5

                                                              971c514f84bba0785f80aa1c23edfd79

                                                              SHA1

                                                              732acea710a87530c6b08ecdf32a110d254a54c8

                                                              SHA256

                                                              f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                              SHA512

                                                              43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                              Filesize

                                                              174B

                                                              MD5

                                                              6e11fb89bb86d15b5ebb10e3992d6395

                                                              SHA1

                                                              a77bf80ac9e06763be7d85bfc8174f6e35f916a4

                                                              SHA256

                                                              3ca2609d97a290920305a4dac612fb292254b4c86e9e6113df234ee2454d9432

                                                              SHA512

                                                              0aacc51b7896321fbcf464bf5da03529b36ff9d9922e65dba5d1fa89accf3b1c97476d538aa1f219c1ee3f092e905cbe0802ec16ea37c1818bb9a1f4e6a32568

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                              Filesize

                                                              170B

                                                              MD5

                                                              1ca2fe6c92f37c88154ded0fe1c49da4

                                                              SHA1

                                                              13a55de7aff9dfaf4b62fb2ae20aca7ef3697beb

                                                              SHA256

                                                              2676bfa70ce5dd9fbba1d47d27b745d93aa6343a29583e929feb15a80fcc0a77

                                                              SHA512

                                                              2604ac25fd16684735184e013657d1144bfd3443c58b397375ae51c796dc01899a9f2f2cd27a6c89941ae1ec06b633b9c991c905ab8f2a62e384eae481ee5573

                                                            • C:\Users\Admin\AppData\Local\6e2b5cd5-5b08-4dfa-ac48-058bbd1e3504\2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7.exe

                                                              Filesize

                                                              869KB

                                                              MD5

                                                              b61223f5063b9290cb7177e0915be648

                                                              SHA1

                                                              041b2958f50c016f1d2525848b2e0b3cefad1dc3

                                                              SHA256

                                                              2b7bdd0b8bde43d8e9d9a32352a408c5028e2a39c694be064a6ed18d0aa830e7

                                                              SHA512

                                                              d492e72bea3996df52eb0631c411e806a9130bc1bc2dea514247f0c834c3316473bbe751dfa6692355d035ee229cb8fe7e5df609af757963d9c4641c35eb589f

                                                            • memory/2232-16-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2232-15-0x0000000002310000-0x000000000242A000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/2232-1-0x0000000002270000-0x0000000002308000-memory.dmp

                                                              Filesize

                                                              608KB

                                                            • memory/2232-3-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2232-2-0x0000000002310000-0x000000000242A000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/2480-18-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2480-19-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2480-27-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2480-29-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2480-38-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB

                                                            • memory/2480-45-0x0000000000400000-0x0000000000537000-memory.dmp

                                                              Filesize

                                                              1.2MB