Analysis

  • max time kernel
    134s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    17-06-2020 12:45

General

  • Target

    _____.js

  • Size

    345KB

  • MD5

    9f220cdc2f8bb7de9e73b801ff6294c7

  • SHA1

    2edd8dbbe2a83042a4d0a26cbdf4731f6560c7b5

  • SHA256

    1aa695ccfb3d46f59bb777cc175e93ee12b0c80dadb89aa2b6ba7395cc9d5048

  • SHA512

    b0857157adced890cb9670937921e5424bbd6bca4f38bbbb282610a0710f2b916a82cead1739fd70d5b927d8d89d6b3f234b91fcdbcd7dab6087f729fb623c04

Malware Config

Extracted

Path

C:\0vikj1ce6a-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 0vikj1ce6a. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/53E44FAD44EA42B6 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/53E44FAD44EA42B6 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: QlKrgdfzNJCpdZBR36FDw1ACQS/GFDITHJtLBO2wvk2acJURxWKm3wpVgsRsY5nc eyOaHZwj3SgxavuPZHugw1sN07nFcVaByJd5AOEgmIj6VusxX0lNApEbbyWKJSQ8 ZV1/vB6DLxoQJkGlIUNpWC6736hRb0RNypFPiGSjx0Rk0EySRx8LqgKBym2ccByh TcfFo2UcMnbfWrTteBZtw1Vrk2aINnn+bgpW8/juJp1L9abycKV4EEpMz2NOsjaw 5Z0woMCh/R6yJK169FQqIxgJ+FuZ4WrATq1MVj+vJbv3ULOIArPW5U9+uJXf3ve0 bXJw/xGAFA+x3gZry1HkeFz1tBNnmrFhFoXKI9btdlVorN5noznnjIY6UWCiwa66 GPgbgGStQI7qEbRgF/q6FWXcoo1FsS9nuv2j8XC+fozXm8Fxo62RTJO7jHkyjwcM 7OL8J1pFAnyvEmL0xMchiFL0PNJt8mxjDWNzRo0fiUCS3uPw2LoySjD4kj93fqAl yMoxImLg6tUOWYdxtxD24jxYtnYiljbLVX7gboUoF4y6yr2/WhM+Pc+YZxucR0ZD vMuASoP/HCKwMBJ3xPNC31eTKTMwLuenSZ3wU8CHR03LcFUbGQZmJCRahsbnDjZ0 fmxrbLC6+fI1ttbmAPk7KKMImaJ8yi7SFy52M0zFGhHsmUqE7C6+PBMiaIXozeKV 5EqFH/9t2UCdimvx/DUC0e7v1/hFRY11LKZVprs6QOwPDTsKMtkKeyCGXsHXgzrt NaJpGxMHS6RkLPJ7y1qxL+/znWZ19143OzT8DtEdLvKi7PsftzMO7MW+9y0MDc5v vqK8c5KeWDrBU+xRCtzzKoMuIgmo8R9QO4TJfYsGp+hD/0GKfHjTjlYut0Mvhxuy r/Na2Ywm2/wZFxM9LWu8EkJMhMg8i03qxYTeojVP+O9KbEerE2NnVFtx9F4KFvIw Ad7tmsVfeE4cg9Z6uvWCeqXnIV+T5GKlSKd9mJ72PbboLe+9VUnA2No1FZuwihhB t1ufS28C+YXKerKB2rdxyTK/WagXHWpIwTyiCfsMz334Tu7VrtTTYqfhbw+FGZVe Fqjfe+IYf5Fr7cR2tLPkcQM6fIwGloYH59fMmhvIWBeSjd5P1i7/cLkD8Ez4wyvz sXl66GEqfxiQ7G+zo6d15A== Extension name: 0vikj1ce6a ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/53E44FAD44EA42B6

http://decryptor.top/53E44FAD44EA42B6

Signatures

  • Suspicious use of WriteProcessMemory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops file in Program Files directory 21 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Drops file in Windows directory 3276 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Loads dropped DLL 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\_____.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\45324.exe
      "C:\Users\Admin\45324.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Windows directory
      • Loads dropped DLL
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      PID:1452
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:304
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:744
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\45324.exe

  • C:\Users\Admin\45324.exe

  • \Users\Admin\45324.exe

  • memory/900-1-0x00000000025F0000-0x00000000025F4000-memory.dmp

    Filesize

    16KB

  • memory/1452-2-0x0000000001E10000-0x0000000001E21000-memory.dmp

    Filesize

    68KB

  • memory/1452-3-0x000000000062D000-0x000000000064C000-memory.dmp

    Filesize

    124KB

  • memory/1452-6-0x0000000003B66000-0x0000000003BCB000-memory.dmp

    Filesize

    404KB