Analysis

  • max time kernel
    135s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    06-07-2020 07:24

General

  • Target

    368dfd0ce07c2010b0bcfc05b60c653d285b9b201c0da60c3be6f6110a89140d.exe

  • Size

    132KB

  • MD5

    8ea56fd712f728e5ed1a7dcba86ca9e9

  • SHA1

    1ed11049103a716f8a21f0fc7bcc07d20090871e

  • SHA256

    368dfd0ce07c2010b0bcfc05b60c653d285b9b201c0da60c3be6f6110a89140d

  • SHA512

    fcb77610abde19b1bfa8c805293e015b98a65b6845f241bb8a25b94df9c8e3f7a4e8ce95825530c72118ce57d907f6e43dfb273127a40e118a446e81d3a86a13

Malware Config

Extracted

Path

C:\vmg3b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension vmg3b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CAA0D55EA93F4A25 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/CAA0D55EA93F4A25 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 285hgKJqoGhUUytl9eSDkzSo/kmXCWmnIyo4G4Ur0FzZxliGvl7lrfU1KRTTvF3a ilXS4yV8/L4lt1GJszsGcnaaErpGyGHM7vNV1R8Y3wgdVOsLAupq+0yl3wZa6sVo NszzUzWjk+sBqRKTgj4cTFqZaF20Uo8RNG/2SoscjbolrHgSI2U6ySm5+1LjZMqT 5f6o7ETZL/HhRv1MqGBlp6TprXZ7Gtr1EtaAJvXSuxg9CrI9umDW6Xdphhsj9JOx oELPh8QBBr/to4cq3MV1FAsjtVCD4QMok2t9SjnKJyMhF1LFem6B9WRY9GFxv73P 6J455xXb68OaGay1uN21gjgZYlwTcN3LRmneSOYI+nsRmE/hb92DEZ1/ctse1fxL 1q5HUQ42f2UIpsljuiQl9AhQsH9PXLhdSSpAXJOZDG1p3qwaDM07fJ/BRvjBIl7u i3+aFXpAWi/tr1Io9ZDrYncAloWD15VyKVKRjPuSeRawytVYr5IrKqWG2D4ry9jc SKoRtGedAxTJO9ciVtHwaQRAVACkvBGprHWp6tiTVLmocA9I7o5dC+/4DKETJWOY rqLhZpmsfndUzGGdSTR1jpnmNGFSJ/jdqAQdajMHJcjb56PdaPUl9bqmATX0haPV xeWpC2sDQtmXMml6FSPowARACxRL55f3JiLkbfnF7jdCqtLIwC7Trii1gcW41jYA iINcTutmy7yvUq3k2cKzPhuM5vWPRCFKEoH/WaS2TvSJlE2VqpJfMqPJlkAlJlV1 h3ffGox4mTvRnLBtiIPDJ4MmNy7FkPhJFZUBmiylyddPI5w4f+EupkbsrlkDzK8h O/+j/iCfEgC9POZgB+iyidFxcWgJ+NFgdI0ernnR7vun8lDOKBXz3zZngO61/ABc avjVGe35G/lgf3t5f1vCQpGuiT4hPvOMjl0YUte3GVCmnO7qZVlp8iQbql2KH8dN 3vBOCcdm9cdLgMJaLQkI7eLcKYSjUMYw+6vZvhPZ+vRuiIQJR1W9YZOqJ8sfkfry LxlqDRdAtNFZ9cRg8eNZcwBOq1+hRvpVACxoEAH0BG7hGnZiNNK6bUY0QWKusUDO Gkj7jX9PJ9TmzTYynFpcO1HKTMp5sMGhGw64+iB6wCWqzl9/JbiUlpUqpZMw1xRN v9tkelkYEQTaMLRxSPGzGp45NbzZJPoTPFf3oYnfaMIGXi+uoH3Yxj4s+MgyJW9A f7TnjKOW7860LsqZjrxRAZOpSkOIwCvCF4RsfCieaMBErSORN3LBCHxZ3PRo90+B nsVx78QyLrf4AkdtxLg/B9L5eYRbjXOOLuZ9nEO+ ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CAA0D55EA93F4A25

http://decryptor.cc/CAA0D55EA93F4A25

Signatures

  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\368dfd0ce07c2010b0bcfc05b60c653d285b9b201c0da60c3be6f6110a89140d.exe
    "C:\Users\Admin\AppData\Local\Temp\368dfd0ce07c2010b0bcfc05b60c653d285b9b201c0da60c3be6f6110a89140d.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Modifies system certificate store
    • Drops file in System32 directory
    • Adds Run entry to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Sets desktop wallpaper using registry
    PID:1100
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:316
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1588
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1312

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/316-0-0x0000000000000000-mapping.dmp