Analysis

  • max time kernel
    128s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7v200410
  • submitted
    13-04-2020 11:40

General

  • Target

    ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2.dll

  • Size

    166KB

  • MD5

    c92b042810b6ebc8c31dec42d898aad5

  • SHA1

    1ed1e16a78c0760d318b6bf69410f3b35126eb75

  • SHA256

    ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2

  • SHA512

    5b662a76302dd4379619a01b6d45f75b045950245c326a243ab18f8923f823b0607352c1d4162d949779fa1eb6b08e513e15289a7529ae457af4a9752487d7b4

Malware Config

Extracted

Path

C:\6ily0q-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Fire Quest Fire Alarm Service. ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 6ily0q. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data of your clients and business contacts extracted. If you do not take action to contact us, the data will be published fo free access everyone or will be send your competitor. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2356FE4A97D19E6 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F2356FE4A97D19E6 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2MFA2ehiJgAeybBN5OC7KEmAu36He4AiGLsdR7XVvae1T/VZsBJog/UJWNdD6Ksi WQMcpiY0fFiNB4I/lq6M1MjsnZWjwpkQOkgoOXVMhJmmUhxuXqNBMdRmcgihhW+4 FJOf36HZmgR8R6L4zTDW3hA3/O3rxTGvhrjWTOT/A/edulqciJw8W+gOtf8OHzZp XPMY2wlothQCqE8pRQPy4N44gunb0M0Czt0K5AnDGQAxYh9AyRyDtMIf9THfsQGa F+L39SDpnBdUJGfDvOD4G72V4pDqsFCKfu9i/eqrXKWdZ0d7ebLOKDlRYGxZCop2 sKeJsCL0QxlpIEriNjGQben5BNCh2CUVCL/3LicoKSBEDK2wobjPtHI3TwwU3u91 NofO6PG1R5U+Y3XfwQrBt61uugrCEsQ45LBn/exb24MwVsgcSaNQZWS8fK5ZqHyj HwxRclTZGIoOdWuWvBsklNUvA6wfauDUn19eZOTMUG9l5fUJ2bmwe4USkDktnCmd 6qb9bMj1bauejJcaNFL5IZtc0ONmVvnefPEet+az1OFFMvA49pOH/tX90D1HJVSX AqvupWf3W3pZgBxnHEAPBYyQp4155DX55FwbwvGT9c8oZf2/x3Cc+CshBNbtnkbk +PeLpNCj3ghXfYQ5zU+e49SGRosvIZKpRscFnG5rV6XXSGAoGGZhxV45ktS+pa2z DvR/GgF+oADHOri0NNmo0kZDjeYMFpyG6yv+58rKSYJ2yb3bMf1a52LDdbFLplyI cvdrFbz4lcGRk0bhpeii5N1nODNEtwnPxySIkvtCn3Kmbb6171x13gRlSBSTNC8A HzmlbZjY56KNrJwDl4pALWU9GhtpjDbsMYNXRIrBDHlE2qL0LTz+rKAt6R1p1bLD DNfVOY4ezQaZhHC81Yub8/kpbw8MTFLIb5PG8Utp0y/SumZLh+S0mcl36Bq/k7Qc 26bKccJp4x98VdM/OmYXP/y7AkQUPI6iYN3vLjzjanDrGNzl+e3JMjoLL3wX7TUU c7TNoE7RvIxbAynF7fedVS7NmuB+Sn0N3rbDb+QzzhyqvCIOoVGab7AXWk6NeLxb YCitgiK3xdTTS0HJtzV5NEVDVGDxwLrBpyVoyy3hmd1fXqIEIOyTrVgIDIpOUQyM i0sPpCmbO0/Fm74l1psDxy9FvITErs++WDPwU8J2zVBRe8QOY3FU9NqsKvJoS1eN KznD2zRxKWTt/eGDBnYlfOc8+sVEpxpAW8NT1glMI9OOpSIdUOQu37CXvv4iXjgC IKkDbp+bAnoKwcUiGkE/a9E68yE5db/j7krf5cl1W0Q= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2356FE4A97D19E6

http://decryptor.cc/F2356FE4A97D19E6

Signatures

  • Blacklisted process makes network request 134 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Discovering connected drives 3 TTPs 6 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6a96bf68ec54d78f4f4cd304acc6718f9dfe398f368bc1e5b127bd746302f2.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Discovering connected drives
      • Modifies system certificate store
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      PID:2032
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Discovering connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:376
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:612
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Modifies service
      PID:1684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads