Analysis

  • max time kernel
    113s
  • resource
    win7v191014
  • submitted
    09-12-2019 16:41

General

  • Target

    0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d.exe

  • Sample

    191209-xr9d11evle

  • SHA256

    0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\46u34-readme.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 46u34 extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E27DC6532B1C89E1 Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/E27DC6532B1C89E1 Page will ask you for the key, here it is: QtdiV+EJ0Q8pCjtoc8GisPTVHE6RYjTvjaTy5HL5y5WseywTauMcra7C6ziHrdJ5 9gR+x6eoLSEaqpJ2zANRV9HctCknlabw4hQs+xi6YkMLvbL1+7PtO/MPEOIynRJD WX1xJ57KbB02Algy+KoTV1UnAL5nKJ9aTMIwHoSW9BMLWn1YsNty8ntbkBXOpIZd DZS60IoGBSK30/QM7uNydRgCINqEbdoJwItwNpaeAmq69RERUX5juiARrMGuaiur F+SqPb83p1HqGR7/5DP5j3Moj0xTLbV+CP7wIGPEl3v88H+clKuInW4ZGhO1iTF+ PPXIvrNnGwTMfWViIn1fKrHOfquLUUso17sGS9q0S4FhmqdB4oNb1pHr4YZFJpoy A8YicfKiFST0u1QBn0lh7htwG9FJSIkDDJM9/cRRDoyI3GpbTbcvdozW+r2qeGma 25zVhjpXe6/+HG0MXH/UMs2CmkIdvoTwRCUfalLgeUE2GMBJm6voRiUZGmalNrta fJpJGiEnvwmch0XwwjnI49+ZBedH8AsUD+5k+nuTaONhqFGFidkuP1XbBif/KHYQ caYHsmXZOMBhP14QIb7xCx6GuBiJWYxBssRYE3kxke5wnip5QmbZxun4sAh2ozte n1r/gbK4dUBuXQgiEhixM1NyEXefJ+nFkWBjZEc+lCvL6leT4zz0OBFDscAEPQ3A 7QjFyYB+xdg19AOx8IWC41vcWaaGvNbsNPqlt/YVXj5R72UUOIEDq+RwhqopUiaJ eKeVVMLWieS0amqpcdltJJqxNFUxKqZpnEuWmLtMy3yJwZ6En89pMdb87NGH/JJp b0Wk8lsE4ymXI2GIDInmu8ofiJlEP0x69ywAf8VdUtgJePWhDDlVOSfuANWPZNCY oQdf4mgRD/pjorFv34HhSKRk3/A2Oxlot0t+8xTS3lqCZfrPlZdrBM51b6TxVJM5 /pCQn+aBS+xouYyod1xYWvBvl9Dn/n8GpWmEfc3WfQQr7oUAIoC7OUw0rCHK+kJt s+GOQ6iH8Jo7yeTs/FhoU5ypikW28C4r/fmD0E8EVoQyB5t9ywCgGiBi50s2QNrc shKKJeXNiT8N0neO+WslCSLSnr0+ZQ==
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E27DC6532B1C89E1

http://decryptor.top/E27DC6532B1C89E1

Signatures

  • Discovering connected drives 3 TTPs 5 IoCs
  • Deletes shadow copies 2 TTPs 1 IoCs
  • Drops file in Windows directory 3276 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d.exe
    "C:\Users\Admin\AppData\Local\Temp\0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d.exe"
    1⤵
    • Discovering connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Deletes shadow copies
        PID:748
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-753189588-1433744804-486626420-1397814957-218450254-446217199561556025-1941111257"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:476
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1908-0-0x00000000002CD000-0x00000000002EB000-memory.dmp

    Filesize

    120KB

  • memory/1908-1-0x0000000002620000-0x0000000002621000-memory.dmp

    Filesize

    4KB