Analysis

  • max time kernel
    135s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    29-06-2020 07:44

General

  • Target

    07346bb5f71e3c67a9ffd1b0d9602452f044b9262b468b6ed055f6548f26327a.exe

  • Size

    115KB

  • MD5

    e9fc1bb19a3765d82f778e88f82593c1

  • SHA1

    792e99fd481616525c1b6f3f9835e8e24c0f4684

  • SHA256

    07346bb5f71e3c67a9ffd1b0d9602452f044b9262b468b6ed055f6548f26327a

  • SHA512

    5730d2e249e03f415096df4d1291aae3f62320c11614d5bd9c3db28ec5291e3fc392d7cc5a2bea0f89f4af8c3922a30cb38e42cb27b8516c786276757a4046fa

Malware Config

Extracted

Path

C:\8av98455h-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8av98455h. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/47ED879AAE1C75A0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/47ED879AAE1C75A0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: dqIeeB8ypEaUR0/4FlGIZ9KoTCcV4NfP+9vpnBaMvfi/tR53zG0ZygOxduhkU+hq TZO/PCan3WKAMt9tMUxk4ETql9KOj+Ey6f5u2q7oZUZDlcKOCPgZqTYF+MR/wCjj u8iBkjSOAtIgzZOiqyzhLIDucAUmh7NdCqLA4T4vxGSziTPQAIHfUx8JcwLKWz57 5ziI/wCC6aNUen33IMvxoXwkJ7Gb4YuU6ZXNV37zC0gU6p+20a5luCPjBAtoWQLK o7bCnPG+2P2EirzqtaKqRQmhkC22q5mHFdXVjSzvcAzbRInK0CC4sktAIbdid8Pz htou95PeG3Jb5G1qSauB5jrFeWHZT1wyC27/SGs/QQ8/SQ5qRS/P49Ahz3zEnUBV m9sagPAGmlUNhbEw4xrx7B08Kf6Hp13lS2z92uKYOAt0DZKXRokLJ3T6rTz9hCae iRk+TpOW+44Q2eX+XMHVpzjmdJBGEtndtAsFtqTIoh3tkAnObqvKIgdhihVGFf4x qoe26Z7kvJ2RDzzHGRy9RXjPTiOFoMSf/p5an+RUJWCVjEWbzm2wTli9apIXei5W dH5Ei6Vglw7CkQ4jR2f9Kb03TMTGBTAPwOticIxytpSgHXiZRwMd86iLiUGurcCA yT0jGtYmyd7fcTRBmpS7HffeSJyhIV6TC3lX3hq3FRh3gMIlc190928e2V1bKUzp OLCcLw5TCjlaL5MsyAHFlNEcc6qq9mEkj9ymqEgwnGomGoJQYzNJuXmUYxko3DTq VYnqgxmebw6lgfiQrsrPZWnM+hwup6E3EMeFeFzm5kIrlnDzWeUmXPs9hu0K4guB j5L69H0qu/lhoH80wpcMfH0JRmETgDYwGfKkCoDdsvPkw8djcUPzwAlNwO35ZSJ0 H6Trb866JuOOKQiG2g1o45PeFdtRgtIuALvXjuBHAMc1ZosjE9a/pVUg9arGcQdC 0ZWgJmxmcok/Kpl8FrBlX7wG123hbMc8kbT4LfzmKaNGyHcAJGAH648Glsj2ag7Z B+E37NL3GF+V8/wS2VB3EKe7yQV/p3xVNKTs1USDMs63ygeIabURPW5IP4QuVB2h fdCELKn68bys7Aj4iLQFyAVQIYsUYINXelC6BZWjwk2EUPF4dHGTDr2ZlU4Gkq4A vXCykSgG5VmNhvWQbgZRE6Au6jXtUBRZ6Artj/EaydiS0iZD4kcE1zZ0SLkO3b4K KBRiinuMfpZzHCuvs86rnz3hIb0XwBXkKYf9LwMathyAhRjqQu5TxmR2JbciYuAi mbeIiFhVlMtz8ayIsldk15UpMHG9JX6rb/qtNbzmSJEtThoJYT4= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/47ED879AAE1C75A0

http://decryptor.cc/47ED879AAE1C75A0

Signatures

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 75 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07346bb5f71e3c67a9ffd1b0d9602452f044b9262b468b6ed055f6548f26327a.exe
    "C:\Users\Admin\AppData\Local\Temp\07346bb5f71e3c67a9ffd1b0d9602452f044b9262b468b6ed055f6548f26327a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Modifies system certificate store
    • Adds Run entry to start application
    • Sets desktop wallpaper using registry
    • Suspicious use of WriteProcessMemory
    • Drops file in System32 directory
    • Drops file in Program Files directory
    PID:672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:772
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1040
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Modifies service
      PID:1916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/772-0-0x0000000000000000-mapping.dmp