Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    20-08-2020 13:03

General

  • Target

    4002b38c82cb339d1ccb434b5665389dfc33e0efb436bcc86928010797c89695.bin.exe.dll

  • Size

    115KB

  • MD5

    be926a24f4118fc23f09ce4ecd9ebff0

  • SHA1

    4d6b8d954af01ff556aecb055f1965063ec3471e

  • SHA256

    4002b38c82cb339d1ccb434b5665389dfc33e0efb436bcc86928010797c89695

  • SHA512

    278b8c39930f5cd98660b2f770452f227947800baaa07a8f583d26d67bd420e3a09f44f9c625068e18988d50318c0d5ed97dc0600b5e60ad803a222dab969ca7

Malware Config

Extracted

Path

C:\n48e3981gh-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion n48e3981gh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C9DA0EA57E115466 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C9DA0EA57E115466 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ReI3dJ/Z9zgjWCBdPQolKLi/ToHa0JMea0ZLvDdl6yPWH3wQK9gNkOTvu8yJd8fg rEvys6cMneKUDi2bomiTTiYP9NKDZxFUg/Bh05RaPzVh1ISz3+BDRh+m6kEBvsGJ bquiJYXpoUGbPVJZepJNPmdb2FkFndG5he9oPjGjwqr7L26SprOzaGGPxv8jIciO M+XD6urhXtfBf0jk4qUBQoDVLKUbn5LIRf1LAP0pefWhGNZqk9WNtbJ894VIs72R 0DqfPuUXrZZeNT1zfk2VIhywWW7z+mSdZrQAZHwJPhRdQWht6zcpRCP/ckFc84D1 UNF41ho0sAxcYHZQ2jnsIVEx7M08z8fj0evEZE49F4PNMSyjjYKQiEgaEZcZXvs+ xYBrGUEs5EdODQr5fSiaXxpYxMqUMkWY/b991t6dP2MgRdi1fga+JOeyojx8J7KV vHeqtU1HckCexReLicMWknmYahQUiL7JsWe2WgFAcWcVOMEdyIGjzKsB+3eJzKBI Rc49NfbE7rreB608SR9xXSO5kH58mfovLbvTX8lxO6TXikVIhHzqaLfSLTnVi54Y TPv0HddmKKbPVLDbR6EmSTUfefgftaN0TL3ooaW1QHEe886k3QMGuEFfkMt5LWhC uuqWe5kNZ4nXq2XhaAJ4a4aVobowHezJlpLF/2k7E9pG/pp3G/5qWKMofjQEC2Fi jxYiyMD85XHVLYqUDrDOjedf2pzVAvaM/WUa3l6vVO9cAC0OGPzyh4jaFltUxdFO dTlfKD2MCSR0G3pkIe6dBJ5a7yz43y/UVL8PeFAdNq9CrMg4It97r9dKT44W5mjj 8FB0uq+tV0zVRjtYcluHWhEOZXxr2ooviMG0vSs0yTeApltyWbBitqVDb7bt51xD 1TwjDFHPX4dgXRuDmVYUMTRDEizhqfn9w1IWXdoMNH5cBluxUH/Sfsy9DU9qedwn 99cXtuQX3vss0AjyO1ZZ076o/bRFmvZcP6KDTzTsD0MW0h0/LbTVqQC/nIfq8wGJ VVCP19drZESPN36HBVoa/ZBLlDOmaIxygQdN/62Ur0PDO44F+vDejqbGRe8B2OiR 88tFP5gKEEoEkCnICQklAEO2vVEMgM7AABu1BnAAxdfm25Fp6zOOME8ze1KtB2yj zIXsp4Qr6SRz764YJKStIZxEaHA621q4JRbxaNhAGXTkFVKLvHIWTHqE4ECNm5Jr rB9MeHKWfIHr6PJ00Cgg1SDU2OQHRxdjIiRFc/+O6+rA/q+yZ+1L1yewtLkrUN9i AXRhdbHPyUg7y1Sqrj2L6v5+8Jo= Extension name: n48e3981gh ----------------------------------------------------------------------------------------- !!! !!! !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C9DA0EA57E115466

http://decryptor.cc/C9DA0EA57E115466

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 117 IoCs
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4002b38c82cb339d1ccb434b5665389dfc33e0efb436bcc86928010797c89695.bin.exe.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4002b38c82cb339d1ccb434b5665389dfc33e0efb436bcc86928010797c89695.bin.exe.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3968
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3520
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:3512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3880-0-0x0000000000000000-mapping.dmp

    • memory/3968-1-0x0000000000000000-mapping.dmp

    • memory/3968-2-0x00007FFD04390000-0x00007FFD04D7C000-memory.dmp

      Filesize

      9.9MB

    • memory/3968-3-0x0000022CB07A0000-0x0000022CB07A1000-memory.dmp

      Filesize

      4KB

    • memory/3968-4-0x0000022CB0950000-0x0000022CB0951000-memory.dmp

      Filesize

      4KB