Analysis

  • max time kernel
    112s
  • resource
    win7v191014
  • submitted
    09-12-2019 16:34

General

  • Target

    74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac.exe

  • Sample

    191209-5gbby7dm12

  • SHA256

    74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\r79rrm-readme.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got r79rrm extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BF11B64AF0992ACD Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/BF11B64AF0992ACD Page will ask you for the key, here it is: EpaHPpziuhud5akAau5Va5wrGrsKgJbrUuNVQXyD7DuThnb1qeM+u/CxWxzmbJJO 8VEpeiU+93fhUYa7MEuK2NgUd0IKlOmZe76wmmm0ApxnVBKyv8UmTg6KVhcDp4nd RPzJu9MPl4VnFM2j8+s7OrQ87smJ3nq5cID8Bcaj+j/fp4xDRaDK7Lb0KX01Oulp 15xcIuP414se8ACLgtdMmnINdsA8MR9xyb/zNrlM1ypeL2QzN6P0P6ZYQ05bGADe +tUCHWDHD16O+jJ+Yg+zjBbw1qTNW1ZYsTN1cOcGq+N83ObW3ygJLSJEwi8y2m62 xHigVNnzwhVjgMcdXUf2r+LOZ6G4L8Ab/UYqQ/25VZfzAXTBEdtPYY756T88F1/I BNX+eX7UAlCetqg2w+f6aO7lCNVTeZtcOI4GcmhtZm1jx3f+O4Xi3i6AGE5Zh3Ur VfsHyjzOlvxe0jOtKpYiMy2JnUr3ergRn5dJiZFDjlYUhII0v5V6dC706Lo7WU18 oetgZuhiU//bhDlLQXAdjHVzh0upoiIJjFT7oCh9p/aBPj1bY9+dsklotAEtox3w 8gSH85p+3fLLr+qqfdQGaS59lEaEShGwqrC6uj7ajuChooQ7ZC1P6YQ/bGK8s0bN y32IBC84N/sBB4TdPhh7JCDBiHwWdfh71iwMpaSf86HjK922jZ2dg8VkUJM4qzac PgmMn2KYHgi1YhKT4bIdvZUqar7lV4aka3NrIgmcoXb2RU+ykblCnVp4fIpKKEtW 9ZDetzPJH7TOoQNPROC0Yz9bil9oX4hmlqzLS6VuQbcszulhPebpIW/WxhP/h6sW z7g2zUbUj8mdEczj/uV1iRDCy6L3VOu/MtEceQlcOdloDKM0Po59e3uk9llS2O3X aGHtCAw09WLCai5LV2AZIwE6tIJcS1wHQSod6PS4QfYWsg35YH6nc3dY34Md9tyZ WF46g7IxwViGGl9s/N70w0at/FNHu+6/cjcPMleWNqlvxJ+rKyvyhkdDToKRcBNP RA2hb9Fzj1weoJcBghRZ1DdbjJG+C8iNpktDgycRmA9WVfUVz91eGiOUJclGxysc LzbSsAv4TNBSXzSqO/iwRfkLmCt0iw==
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BF11B64AF0992ACD

http://decryptor.top/BF11B64AF0992ACD

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Drops file in Windows directory 3276 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Discovering connected drives 3 TTPs 5 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Deletes shadow copies 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac.exe
    "C:\Users\Admin\AppData\Local\Temp\74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Drops file in Windows directory
    • Discovering connected drives
    PID:1996
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Deletes shadow copies
        PID:1256
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "184422301228799135618944460-322814422-178056611075657119908867499-803790831"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1400
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads