Analysis

  • max time kernel
    136s
  • max time network
    71s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    07-05-2020 20:35

General

  • Target

    8d9f3cede776bc69e50fdf67e270097b427440bc685a30acc7aa4756e5741eb2.dll

  • Size

    166KB

  • MD5

    70c36b8050aaed69ddaa0a8160a99581

  • SHA1

    4d067a026a2d9acea3eaee40343d49f7c1340a55

  • SHA256

    8d9f3cede776bc69e50fdf67e270097b427440bc685a30acc7aa4756e5741eb2

  • SHA512

    64f949cc7da8e23f41081595d0600aa745b490f63872c10594ec2b8124a85e90fa6c678a718d8eb1339a386e8f2987ac50a23b920c1902418605dd4ede8c54b0

Malware Config

Extracted

Path

C:\q59e80s-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension q59e80s. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). !!!!!!!!!!!!!!!!!!! http://prntscr.com/scer2v We have downloaded your documents, databases, documents of your customers, correspondence. We are ready to put everything in public access if you don't contact us !!!!!!!!!!!!!!!! [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1B912C4D734C761A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/1B912C4D734C761A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 0UDRDY24Jm8ytPvC8UaBOGjyDk/jj6ntdXxH4uWyyLSmVHRhHRcrfjkn70qYcnVv DYuK1yger4g72xMEJLdP4pyNLoTyvEVqgp5H2HX1GgqFVJqRxhp3LhAKxMWtMt4b PetG5MjDLxAUxV2qaCLYuYuyhll8zN0yvIBURR4ytdwGl2XV8oRRXjyk215Q5tqd qkHDsWDctQAydqyheQF76Jle5nuhZ7ZuOm/Pkszgw1EhqkBBwRIAI+slIyueitDG ZnlHUPhJpvbuqwUCcaYepPOmwaVwn0WZVNlJNLBL3DmhvfTi1yLzT34LOkseVPMV aBl6DvKsCIQ0iDkGrPh+S9qg8CXFRI4SbxF/Jf7iBTBoQNXgO39OuKgItbF5hE0Q 40afsyiCU6Np9QQ8wvAbmMm5yICHdodnJsxVXs68Yno5e/xhieyYFJsTYh6qu3VH w78OIp898c6AAQXg8E9Ja8ESnGrzsQRNx4Paw+zZZnCvcwQSTIRgn/wtt/icKre7 Q7oAKKP05oJT5OMfdXXBhrmRABrMOYpajl/yGDtHyQ4wMM8d72LevHJHvILYuQQo +umZBj7sTBSdvlei/0axNFP2ZLYbuTGArV3EKmpMzU4WQzm4lxm/JxI5KjPxeeke mmh7pnzJsv6Gcsor/9JgcGjbQcJSlmd04kC9Wj66hzz1zmgeUelHC2MGMSrxBvl9 8syxrpqe4v2AVoYrH0pxbyDiQln3gYtTwd6RsSBdaeRz6qYT7tMmahcvtFe+HuLV VD4JcFXvZuAtfKLkwgn0WnEb5ZYY1GxAZx+mrPCN5/lcdu17R3sW1TsUtaerf/d7 58mizp7s43Mi6lZ2LMz/z6ZlmwxF45zxw5CuXO7o2jctwLdkfz6hjqyN6cTd+q/V OztMIF0yr7RVWOpXvAggVM5MkvwCLsObT6wSAeD3+Ra4a9g8nEmpXGpsRHfDtdHj VrTC6Z5dScM5anvRbT6ugI6klwHTkd+wHxYMfLWsr/+DHK7OeMpQP4D6HobbF7nM Hn4Q44WWutUGHjHsdhOc9nzfr2qb7SWDdnToy7RPC8aFzTYqxbqCMp37rlHr+Nmk uJTDcMP/n19e0v6ZOVU6hxzTxK/cOKziPnSd8qSOnQS/fgWFeCPtLkbiXzfcQQs0 5aQ58qIOIG3mOF0B+/MK4qAkbcr6kLQ1Rj7KgSO6KjpufuIqENIKAy1eF/wPzcW7 F1aQYz2C4Mff5fZNcSzd7sSx5XW9Jku6NbcnNhNPfW1TWEqKXzTvyoaiqNryALnw b5k4DnfjICEPezcIc09XXmAR ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1B912C4D734C761A

http://decryptor.cc/1B912C4D734C761A

Signatures

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8d9f3cede776bc69e50fdf67e270097b427440bc685a30acc7aa4756e5741eb2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8d9f3cede776bc69e50fdf67e270097b427440bc685a30acc7aa4756e5741eb2.dll,#1
      2⤵
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1512
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1848
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:2496

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads