Analysis

  • max time kernel
    149s
  • resource
    win7v191014
  • submitted
    09-12-2019 10:31

General

  • Target

    e5d23a3bb61b99e227bb8cbfc0e7f1e40fea34aac4dcb80acc925cfd7e3d18ec.exe

  • Sample

    191209-v5j5ecnwrj

  • SHA256

    e5d23a3bb61b99e227bb8cbfc0e7f1e40fea34aac4dcb80acc925cfd7e3d18ec

Malware Config

Extracted

Path

C:\45o9tx-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 45o9tx. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BACF4EB76154C740 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/BACF4EB76154C740 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: eg2mERTZYfr8HY83g5qAnRUy8EzilTxxQ9Pv47SDXuda6TVxh+67SPm/P4Tr1b9E P+ifaGH/PcZH8de43piBt5D/Ipo7men0kDSJQ+lK+UeUCQiSAJSZ1fiKl1mQQ/Fl KcvdgqPpDiFVnweGCsRwVeothJIZZfQueAC6QRL2bdMbKxb2EgYxv+G2oebDam40 KSYMAP46ChVN4U2CRq5uamhkyHl6oTpAcmQhO6aeDH18fNYxY0BAOe8kjo/4OZFN Jw2QYxEsOH0BdveRPTuM4XILMvOCIJUYE0jiMs56Ks9nRFROCNRWb6dJBhWVt6Wj qeI8nn/sr5qxJYq9fr0RynnMqUO8i3OOq4QAtTHwGZcPoh5GcfqFXChNXiVSX/3h 10x3lk2qrQg7W6ioUw88pVdBl779ylIU+jXlwX7K8AYc5ttoh94wWrR6MmVIPRBI IzKp4CwATfqZePYz/443UDtDO4pM/Xcctg0zY02bjz50cOa0W/noA41koClVfJhN arlP0rF2kkrQ+lgXs8Rj0l+zojqP0b7kN3J1gDUa9+kYcUDYvBy0JhHUMZRWr5F8 Nzy+hNZGcogKwHZiBgBqSMle55WHRgsdSl/qqZwd1SWdTMAx46+Bu7TxKFXz7c0A LR8RJ6zHKp+Q9N73E7E+tLXbEqp57q/sa9J5O2JO+iOl1+Ho59xK6ipxOVQeIHM6 fBXFoSguLVcRlFXaEMuRoBEgTl+5rLa8pS8Z/m+U8U0jRoHHP37V4edO8YlEKMfV TRicpK0PlfnVUnGS0w2O4qLYYei3XoUQAYKvIsI2Oj7VAEwdVWmTvAYHYH31Jd88 1hB+9FsmuNhsro/MNhKv7naj3ijerN00SoprZQlIsmQ4smYbD4VYhvQnsFlqxCSF eRQSgutrmhaqIFybFgvN26R7iY/ZGd5cdkoisL0TMbWu/u3Dkcwza1KCE8NFtin6 AJNoqHO+OpQU6vNtpgn76zRoTy+qwvweRvL3iLqe96+3ONBjYSygOSE5E35zwpA9 GjfXbycO+rvJiNzZY0VE3oJRGS2e8KbmNRwnp/QUgiHXsoWPY7U63IwwRmyA5Tej s/AGQStdVg1LaSF7nJSQ1Dtlpc01SKsplES6NEs06vV7u9o1FyVsQNloAv2zQNmk sPe+ULVB13w= Extension name: 45o9tx ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BACF4EB76154C740

http://decryptor.top/BACF4EB76154C740

Signatures

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Discovering connected drives 3 TTPs 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Drops file in Windows directory 3276 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Deletes shadow copies 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5d23a3bb61b99e227bb8cbfc0e7f1e40fea34aac4dcb80acc925cfd7e3d18ec.exe
    "C:\Users\Admin\AppData\Local\Temp\e5d23a3bb61b99e227bb8cbfc0e7f1e40fea34aac4dcb80acc925cfd7e3d18ec.exe"
    1⤵
    • Drops file in Program Files directory
    • Discovering connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Deletes shadow copies
        PID:744
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1686574190480285913-1347572241-1065397708-1794387568792226186-370913810151078145"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1280
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1404-0-0x0000000005820000-0x0000000005831000-memory.dmp

    Filesize

    68KB

  • memory/1404-1-0x000000000026E000-0x0000000000291000-memory.dmp

    Filesize

    140KB