Analysis

  • max time kernel
    143s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    06-05-2020 19:38

General

  • Target

    afbb37a3ff2187905a09403d8d42f11b64b06f2a8918ad520b202abfb5559d02.exe

  • Size

    157KB

  • MD5

    3c343d72b1400d84d203063f8c4597e3

  • SHA1

    8ce10c6ca73a4e2279f9aecc19892df2c215bc6c

  • SHA256

    afbb37a3ff2187905a09403d8d42f11b64b06f2a8918ad520b202abfb5559d02

  • SHA512

    16a9eb417f17c362a8440450cceac5d34cc7d19704c4988ea19f3cb51f601f7486e94fee4efd3d0edfe00a5d32ef0b68536a2b771dbce52621c26d80b16a6ad1

Malware Config

Extracted

Path

C:\Recovery\ssq83-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion ssq83. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/370FDE11F2739669 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/370FDE11F2739669 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: rcBs6NR4KZWwMUL5f1b9mydghNVpWMPwIVcqzlM4A7mSYxWB1QYIqGXaf6sjFIcm 01EGEM+Q2BrjLVR+I4ZVrTdPwnEX7OqFV5MMVnBRv//8x7DGa4h7KLJSWfCrQG7u B8cmHelhYhQS0gHAOGBNiNqOxGcplP9MOpNKjJLJ0ycvN881lvfRWKx2R7dnpALn s+rihm6BHmJNvffnUi6qt8n3ULHIhgz3xfCLnSFwLJvTJuL+zBpMnQia5vPEBU/e 8krD9T80gmJQr3GEHmWAemeu+YH2GpAbIeIpgpplipBy/7fE2x0Ttcb9ZSRPn41Z rFB8m/qE1kEMa2MUYGzFqAlUvWkbr9Q3TKl01plmhWjfZrOWF68OpGDKLotFD7ro 6C8RMAEKdTQ+7hRTdBOlFKPHPJs7RNJWnDtezkCEnSHg4ciA0zsJfxf+q40UJXBZ St9Ib7ndOhEosUCvP4jr6lpNMF8UMIGVTuKsT2Ki3LtmrVwZbGUfCV1VufZvmdDR +Zz2MEaCRKf6N4ERRoyBRmvYdZsruixvFSupKDvUg6FdZkhbPMIy0Q59UY22m/0N 7sfCHnV9FduDdVHSLkAkbHQ7g+uiGUEHT2nz9u9rLEc3TMT/NEswzJXRdqCMN5rr GD+dfup5WavYkhsTe4qlFls9cWODttKobxsvDWvJSY/rZGYjYgYLsuVJvHTMbZ4c cIB2gt+SIPEWWE4aT0D2CRrz7+TlTlfYpch+SaEBcsmhE187cGALROGxXS1C6I26 IQ0BWj0H6F4FwlWDoBEQBapjejAnujIFcARHFaGtUQOfGUB9Tki88iuCM4JyfjTY hmRW3Oe7O8s6NbD1k17a+kDf3vFZ/efWpLxsMJrKNn53/Y/F5ZHR7drvJlK25iQV lBzplLBCePWPtSG1OoQUkCnPpOUOySAGLkt2uTou3Urh0QTOoe7vCzMx41WsTd5e NIKbQ5ignfUXScu8ZVbhnXd86J9BrE0qAWQH9Z//oWYwXbDbuypmhwpLQnpdef7y ogwI7Gp2kOJndgeK0xu1scHq1wsqXbr+z98WYzqeWHTD6YzoE7ne5Rc3SUjizjpd MtJues0Jo+MOasPAuTzMJy7zhVTv2edtD3E= Extension name: ssq83 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/370FDE11F2739669

http://decryptor.top/370FDE11F2739669

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Drops file in Windows directory 3276 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afbb37a3ff2187905a09403d8d42f11b64b06f2a8918ad520b202abfb5559d02.exe
    "C:\Users\Admin\AppData\Local\Temp\afbb37a3ff2187905a09403d8d42f11b64b06f2a8918ad520b202abfb5559d02.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Drops file in Windows directory
    PID:800
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1508
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads