Analysis

  • max time kernel
    140s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    11-06-2020 16:15

General

  • Target

    svchost.exe

  • Size

    166KB

  • MD5

    cfd0e9822b75398979cf876a752ef248

  • SHA1

    2ed7e7697375b73dd10a62934a3d29192a993f4e

  • SHA256

    6361413fd0b01dd9bee8c2d942c78a0550eff7292c2ec5bd5bc840413fea1d7e

  • SHA512

    f0d9a9b2dcbbfb832337672769d4ee1814f3034fab9775c02ad752e949c1ca8dddb45586ef635389328d8c9597b036948ff6b6b3c8a7886b4fb7058d0546762a

Malware Config

Extracted

Path

C:\f8kp7r-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension f8kp7r. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/33AF44EA8D4467E0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/33AF44EA8D4467E0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: R5uvbq6H4Xkcj22VLrEMluQBZu1rqfmTimYPczuGpMUmL6jjpTeGAV+a3kcnhcbm 7iE2YaCX+Aah+uE6vHI0PeVzyuVUqtHV5NYTCXZ3d0jQBjbwX6d4WsRjSbH6D3tJ wFEqRbHk6U2CCYUP1/+jl1Z9GdYAi2N4rC1S3lhq/S9MLmPiuoLlQOxd2fOAEzsV TSBgGuatYdVExkm1Ro0NTxDjg8n259E2Dmaawpc62AI0XENXFIgWoTL42VDDtdC1 4t2q7Qd6y+VoIA/qWf2Wp76wkYnhINe+wdqCHDmK554P5QdSknnMwYM43XEPku+a frZhbz+byRZS0NYmMT/15Pa5MI5BVDIMt+xHOeUxBeCmHtW58v3mKKiE0NjTSYfI Tg9z5uPdLTe3jGkH6eqO1OHFwTXzhBhLwXDkr/+m4t8UTzb5B6kdBWGQm9Q0cmjH nGhz6dPzaG/a3Hgjjg/I+XGPjJy7jq3CYcXFnJP49fqx6SUDhdoJNsijMji9ZqXx RH4KQyiITJhfS6eW//iS5xeaN+ecnjQkGQ/CW2nhekB6ljeawxZm2t04Vq7pIuLX t3x9YrgLQcHU5awkwu4cWY1gRrWaHYTxKLKS6/qfgzYviqBD4W8iEEMkv0Ai6cv7 ebDtvlZ99NweJtmLu4bVLh0vEAvrr65jyj0ABK3PQauEM+PaApj4unu1gmYX4g68 pbBTzNHIHt9jAFi+MIvFT866u2xyU47yUNViy253/hYfwEagOBZz/U3WfoSH8bqW 8m4w8GH0pW55lOiAeJtV4INDuBvzckdslgLg6xy2AsMEQLmsxwe/vKoJWHfPNAX4 5e2Xe9kHnvFT8GUFXq6bJd0ct/cC76xnP4W4vfjK9OvGzeu8B6+OYVIhCKiljk4v D7K67sU4hBCr7VkF1ynEAxLrYZYuAvoKOh3N1np+UctMMWfbawlY672kaUg8z19x vry25tg45nDsm+gDpV+iX6e/vvFdK/5yx2iTr2zV7FGIxZXmkJe4ukvTAYz4EAj5 EVu4TDMuJXtvuveUNfLlky4gC4lC4tnyDoovL8be/nWBRHRQQSWA5BcGELxSAkXl cMSnv+T1fc6R0vv3Vmx1YD3RRDF9QtW0eAW91IHaBYHc4u3mJOu7faJYD5osA6yJ 34A4B1AMINQHMxRmRaXhMlNudypASySJRbD+8+SLmUlDgefGhhPSbvKnq/umBFyO OP2Qf9xd7c2jTgEtQrD5rK0te5vsTCGsWGqMaeMxdt70D5xvTQOq6fGBZstKT/J/ hs9CUTvDzXtIW4ci56o3ZhgZdmOydGOjj4xAgk5sr7k= Extension name: f8kp7r ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/33AF44EA8D4467E0

http://decryptor.cc/33AF44EA8D4467E0

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Drops file in Program Files directory
    • Sets desktop wallpaper using registry
    • Adds Run entry to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in System32 directory
    • Modifies system certificate store
    PID:1400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1484
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:736
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads