Resubmissions

04-12-2019 13:21

191204-vcj2bx45de 10

02-12-2019 16:56

191202-4g8res8d2s 10

Analysis

  • max time kernel
    149s
  • resource
    win7v191014
  • submitted
    02-12-2019 16:56

General

  • Target

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe

  • Sample

    191202-4g8res8d2s

  • SHA256

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

Malware Config

Extracted

Path

C:\Recovery\89i132.info.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 89i132 extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0F651AA11A98240F Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/0F651AA11A98240F Page will ask you for the key, here it is: OPiEhXpFKwCXgyd4/3h/91dm1BPv90h70YqRqWbkSIDXoS+v7yOWSWkIAo0oBa2o /UHkvfbN02LHttpjTcY4Ucrv6bH84ved/tnX3Z821Ug1NUHOsZRKydqP01jzMedP 380+VxB8YPMC+HCD+u/rK7Mr8Ygh+5tmyZnNOVEQuh1iImhGWain7WqaWlW4GWkU 88lr4SBJOrXLh/7kmvarb0DO8sCE0kcrIBbgvFQTp5LB0y1LJzhA1jkhWsaYQmjs XaApVw2KsPoUANVuFrbT3PtpvviUTFYJGfxZlYGdExmcx8+IverFc5fUAinrowMv ZEPoTUOyXpb45frvO1SH8Fkd6zDT4HSR/PSS8PXu/Zh9hzTm8K3ttsEUH5kOZCqz j9AIA1sE3uJ50fYXwH0sLn0C5ZjpnbneYAN4JYX8TUvFxTab2qfpGAaZRWh0jF93 sX5VNdx7IlG0jaZAZ+rPbakxd4H42szd10QoOYLfwmJan58JREou9Avp5Bqosz/R 40eOOY0v+IbcTxS+sqvGdbT/AnONxqdAfgIsmhVDyjgQ7RMYJb18XpqSpMRB9Ypm v0PYp0/nzIbMz+UNaCudc/o+E9wydLvwuj41SWMBPOG1cfNqROhcQdRXzC0RiLEM +bxytTbU2fPL4SbOdH92vpsRCkTar9YknHsEfzCQamBnukyS3XmgfapYbbqamqa7 tJbrXudaz02dvHmRu0iZTZGOFUoe5g2JANZe9yn0Q4jk0XQCsrv5yroj/HBMzFeD mQwO47DbMEDVtOxKreBuKfrHZCQC0rXyY1L6gE0Kobt+FOpbz4gJNsNsC2ooBilt 20bWELn/6Y/tGwEQ6fFGoB/WnXqkFDD29HSuzBoz92uuZZrEVfJGLeMzL9S4O3dr xsE/l46Yun9L4S00G0SV0zAOledVDZcPqv/upN1UPZIyWpigyEmox+6+mZO73y6l qE6rTHvdXax7l4ehO5SYNL2S2YzhQ95FkurTEu61vUFJX3BCcfc9PzPovgyPG+0L uDOxDXcII2cpn/VP5m5M7mPOZG5L6/BeryYEoB+iAJwvo5g14SyfQpCYXrFQ3t3k uYO9UpQZpuX5E7RZol9vP6oGDv8tFxxf
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0F651AA11A98240F

http://decryptor.top/0F651AA11A98240F

Signatures

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Windows directory 3276 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Discovering connected drives 3 TTPs 5 IoCs
  • Deletes shadow copies 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe
    "C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:876
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Deletes shadow copies
        PID:1088
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "13736575861871489881-16881607701145638119-1445741727-334327988-15014401241888056553"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1632
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads