Analysis

  • max time kernel
    140s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    10-06-2020 14:01

General

  • Target

    random.exe

  • Size

    166KB

  • MD5

    9c21e23a91e0488d8df5e65b5d29a2fe

  • SHA1

    f032814f2e072178a0c20d7500c2e1e4352aca39

  • SHA256

    fcb9ba05f921f7af41dba56b278c39715a8631c27048c70d098574e7ec20db22

  • SHA512

    6a9008181203b1d02e62256c62d41e6788caf16b60977ff796bff8b4c42efc815b092082ee99d92d459c54f3b6e440ecfa16d5bfff9a63aa099f48ba20fc53b1

Malware Config

Extracted

Path

C:\44p6id-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 44p6id. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BBEC224B721D76E 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7BBEC224B721D76E Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ZLZPndINKtBp6E3KUyCJQTUFlH29WnXEW+aELssSZXp4QEdJuP76q36FCj08SXOX aX8PNzBeRRfAuLFLkE69rmphgUna+CyMx8Fa6TdJ/2VxwNy3oWhAECAVX0VEPx46 vQkdRzBQWHh2CBuome3w7kfCfvjA5cO2xFnV/6L8t/XM7EKyXB6OhKy2XGOtXbqD Iu02M22/e3Yxauf62CuTc1GtUtx2So9bvHZ4noiJ5myQDFi+afjzXuMlle7dkbdW tQeLhWGkyC+8NcfQva7iPXQewYQFlEIo9HtWiPGFqhZ+4rm4FkYxstKdvM1yfY0Z indZo7anr6o7AB3yQDRxMdT6Kn18E0hYMcE3CFyhzRBxLLSxH2AaVkUuuZQap76V 8MbsE4VDg+7WhPZqrTBxU7Phle0djabqxDM0WRet85lMDHtXmXDU3Az1GA1/J0+B qd2Rqr00pMegcRPc8d8qAmT80vd8HV87hgsKgS6TmkbykcT02YGgRssQMA4VmJw3 V+Y2SeRh79ZEOpGVk2GiqSkpWtV/cLBn4ou3qhMpDfn9Djb0WuJU36s3EmBWfy5R SO4vIDDfA1qGdW5nYqWyMJ97J17gxJmusWfInsn65DFDoNpozccAQWC5Y74S8EhP 1aGA0BPo1U6+wnGZXZ2nIrUJABzDLSwKZEQsYHW+/nIiBH7057CGZkUI4xh3xRNH yxIl1goyKgIs2zUeJbghj2Dn9jDWj/Sj9D1nQRupE6OZB3SC6lLc0hL1izYVRoKJ wT9N5PzcWpvEjbVSI0tRbRTeJUlA5g76hAM0MX5875fk/T68ZW+ig2VTfAET7jNY yRwZzoz4dhmCa004Kh/KpDWSipynjrSY9/Mw74HTmWnnt3DOIL0ostELBHemiUto dqEc0NGqVcRax78/D72wH2t9JuqiiOUr7Ym+JJqf9nh0Cg63ydsq0yneKN/WG8Cf frqylkHXYIfa3M4tpD87eF/ISOOMCVmj9864EXQW+wbdAUA5NLiUoaRyyS3FSVHi rJBhx1jH9R8SMNHwAJMeofYgkpdhyHmKzpskPQYSSfNsOYkqOTJC0+YzbSLKNhZw zEqnVO+wCmZel0vPq3Hk3pxNuVvptfr6RWnHtU91YGSfATkJpQw9SnIOG2SN8dXc 0izX7KLjtLj3e5Yl1hzIXZb9NPHxbpUqFcF2ZnrQ0PWPZhuDiEQsNEmhd6oV3C31 Bfe4FD6XHlOrlrmC1xoGh0fdgpq/+OPJ20N658oN1+nfQNDn6fKWjS+w9I1YGEeF orwT9Kj1bnsQ3Xs3538MFGnobThUbaEag3TWICIl+xE= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BBEC224B721D76E

http://decryptor.cc/7BBEC224B721D76E

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in Program Files directory 23 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Adds Run entry to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:756
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1640
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Modifies service
      PID:1836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads