Analysis

  • max time kernel
    132s
  • resource
    win7v191014
  • submitted
    10-12-2019 16:21

General

  • Target

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe

  • Sample

    191210-ne9dsbbgj2

  • SHA256

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

Malware Config

Extracted

Path

C:\Recovery\8be9iaj1q4.info.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 8be9iaj1q4 extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BAD4040FE6406E97 Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/BAD4040FE6406E97 Page will ask you for the key, here it is: eZia+ZnZhHS7WG8Hbtuj/+bnMG2es50TmTPM5F6OCvajKaEe+s6z9DQBS7B0ikHx ZkFpKKE178SZIU7LVPMMWDCbLynHp+UxmPPZRlF24VNCwPwVWeLK2zzXyesCU9Fg E76Xnr4WHCywU4GGis3GZRmduJPwxH1X+gRpdAti5CXaodWYoRAFydZchMYC2t2C Nh6Z8hT1sclF+ZWQ4s63TA8aRjUmhkGiHFwCVYjLSTl8h2pxHrWKcsvEezp2Xqdf FCowivMex0pZw+SNeeNRm4GryhemaXSWnnHwSQwFFTnauQE+77NEWzX5ypT1nOf2 Aod2gZnGP72JSKuKZAS3278q1noLtaZmEazEMqof9XMn94KxBY5ofPAP3srPdrs2 Kr6Qat20rFNs1lNWU7UNU0vx98dOhZmDkwGc9yNthwhKKROlvyBv7vzunkOMbXUi YP5i66MpqYZeTyMguaXBCLki3X7CGqJ/JIc2vE4FPzTc8C58ogX3CqlbBGLtNGEd AKsIsOQvo/dzH964gyNdDXcZybtyN6StKet+UhMR12fUaMQOf9oNVuucNJjgR7hT tLOPsfwA70QOm4kNZnodIM5GsGfQAex4SFvu7kCibjsENyzUpl1oSrDevH//HSRc IxAvfOs+T4YXpELIpvhcgWtc/E08I+k7lUYPCldUO3uUuonBs4rFSgNBZRI5tfO/ B+jqp/57bilo5x0bR7Zz5KSKlfOGHUH2FTTZas2Ed6lHOHaqPMgMSOV5NZiK6YI6 TGbVVeewr7ZQxtP5wtd+MsislV6TQ7Fa6PJXkklX86Sc1gkgvwbCSSZ7rPACCjWV PpWvnGVTlYZ6Ncyp66QtKXXQvpPoqT/9q+RYJNwF3J5oW2RGTTuP6QDmZSjehPbB t+UU9neXdUPhPxzx64C4mph8N+ixsIjVs1l7zqKMeNv4WKHnZ/LevOHvljL67GQm 3b/rLUjMDaXD530C4Ph4X7TJm4Fg6byyjhpGEK7VP0wu+2lipXnaWVbiyghQayEK Ti+3zPc8xm/wg/9AJguxI29w8tM2TskKHFHl8I6LGVcYNQT09zc7otqkrPlN3uDk CMSnLPj6x7FNqu7povpICRBovlRG5izr
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BAD4040FE6406E97

http://decryptor.top/BAD4040FE6406E97

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Deletes shadow copies 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Windows directory 3276 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Discovering connected drives 3 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe
    "C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in Windows directory
    • Discovering connected drives
    PID:1144
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Deletes shadow copies
        PID:1564
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "2047884554-723890864-20234238381528195685-3265007651508976079-1753808400-29496113"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:840
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads