Analysis

  • max time kernel
    147s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    01-08-2020 09:48

General

  • Target

    bbcaee51155609d365f6bb297d124efea685df0243ec1d4efb5043d9afe5963d.exe

  • Size

    116KB

  • MD5

    90e6ea15ed18005b431e135186d57abf

  • SHA1

    d8e126cd0f5f3f214989c3533fd22c7291c44174

  • SHA256

    bbcaee51155609d365f6bb297d124efea685df0243ec1d4efb5043d9afe5963d

  • SHA512

    91690e64b9d39b2b1c0fb7575d75d632f5fbe1dd6c36b935ea2fde1e7bbbfc0e68ba50d73919f4cb2502d7e2b46fe98a3ddcb217b3cb1da77fc290e86031c60d

Malware Config

Extracted

Path

C:\g99p63b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension g99p63b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E976AC921A981160 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E976AC921A981160 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Tita7S524UxyvlAEjnjpjqIiZVeLwmtq8l/xaCFU58ngtOHweSwuPrBbZ6piuuEq tojSSpNW3nTOsaxbMHBKk+LSfx5piR1ZNBnoUhGwd/1unaUxeaKAjPewq+E/JX++ 4YdkubzO+OnMHq/3DUjS55cpz+PMIH1Mzk+Rs15QmKHitRCdanW92jYGH/aJcBe3 n37JM1/C8G4sFVK5Wi+jDY685fRCB5dt0AveZkE+cPc4Eea6hKLXk/umr3lNoGL1 DfaaSVG9lwqO+9zt8dUkTzlwd4V6yOKg7lmKkc1gT4tdRUxxOHTi2pU+GcDSUGia ANnzPKJi3uVmq2TYRUd8QRQSW95IRYNW181ektIac3jX4epxgYv30Qconxqj5QRV 8b0+K4gX4k0pslP23eJD2dcvIN47Gme2tqX8kZZTWuamIrTjqa4tjwP1zWucybn8 cP8bgpEHX5Nx5rx/6VKVbbrkGFCcY6LvhY1dlFve+NG+eA0RNeGXP5qTUwe2KVa2 +aPORtlGw/7rDw3hMGMRVfrEsP4ifd8vMh4OdgWZyultTmwMMSrJs4B85h52BSbf XDepjSN5L/ZbXDgTaCxMQ8dwK6UIoM/FCfcB1V2fj8rjt5wp9a+4b1uRU3+MuXX3 8CB7TL10hu5TX1wD2feAoVHUN3hXfKbxgox8uLj6cQaklpExoVI05SsXUhBh+ord WkX4RwaGEfDuwqBPNAUAzsHtDrPZAMo2ARatea8PVGMD13ZjJe7QOdnw6x6ikfYE nZwbELEvt2Kj4iZYTAjuskRJxgwy/XrfjPKE3QIRMxhiLE0XEpFvMQzOw10tGLkC lftLRev4UmV5h/UuQbf3biWI5YvuVeh1NTsRuwSYNZtekYLbrwyZK57Ukb2afJPQ 9DZiNAakZ7PyNyQEbBOlq7L2Ll6tPP70F9xPWEDi+gEtCx8+5iG8Br3rnkRLITDN QGZ/BgYuNWJqfQ8BPlK955ziqYECX6WMAc5ziTIu+BN4e4mUiU+6kAUkC4YLUgUz JM0ivBtTMcKhTgo6MuZEwP6bB4jFYHl9ofeWpAhRsKqhNjtFe7c2aIrJ3OlafMn1 2FywwPYpr9u1Q72DZaEZ+T1+eejvkDNVeU6v3+o4DR0v68ZXtd3NyGk8dn20ZJaZ MjQL8FiiIALKf3AN7fzvlp5Sc6wGcB7x2nk2J9ttdB3B9jY98EGrPNbiPyIaBOf+ oeWNR524MFDj2uxcqrrZL4DgNLvvYQCN4SUrH26HPzM21Q7ZhrGsRw/96gPpt/cq WA1IZEbfcHvTJ8cVHRQu09G/FSF+1IZe+opkPW/1HvYAVA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E976AC921A981160

http://decryptor.cc/E976AC921A981160

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Drops file in Program Files directory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbcaee51155609d365f6bb297d124efea685df0243ec1d4efb5043d9afe5963d.exe
    "C:\Users\Admin\AppData\Local\Temp\bbcaee51155609d365f6bb297d124efea685df0243ec1d4efb5043d9afe5963d.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies extensions of user files
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Drops file in Program Files directory
    PID:1620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:384
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1540
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/384-0-0x0000000000000000-mapping.dmp