Analysis

  • max time kernel
    45s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    20-08-2020 13:04

General

  • Target

    d0fb6f4c608994c787f15ee3b5cc1297180687522ade080c07a708e55ce23de8.bin.exe.dll

  • Size

    116KB

  • MD5

    946a25739c934f91f795e002a9f77bda

  • SHA1

    48fa5f0d87d162f8ae67e01d7ee309ae8fa976cf

  • SHA256

    d0fb6f4c608994c787f15ee3b5cc1297180687522ade080c07a708e55ce23de8

  • SHA512

    07e6ec47cfbb44975ff7e69973c8154d8f26af1acb26e62b40e0003943953ab87b15a222b14bae7bfb74849f9aff36d727372cff3c3954418db7d28e9119ae69

Malware Config

Extracted

Path

C:\evlj584f-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension evlj584f. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CFD95459DCCAE4E1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/CFD95459DCCAE4E1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2rbtCzuo3rC4AccohKsMo68FZ1RvRUNfStLAUH3Qyemu13z+fgJSiaRg07e/Qcpp l/bh4M7dNtSvMlPcSaofRjm+ze56qzJTeFC2ofivH6FAXf5n2NYhkIEfkpNvyv2D lNn8U0VITLgnS8HmVClSvGOMFsf7cNCScQVrPqPWcrgbvPvFPC1WXkiEe3Kz794w Z0amgT9XYKv/rLnHRdgXZr+hTl4nMycdaVVDC35Q3T5xZymxr8uvlwUww3uAQBrB OinG4GLuK7N2+ELapz5IzWI+eLpudYU2jDu4gHjKuYlKRaJqK15iBbWUJjnj7tKo SoXyo5o80riV1zV9hVRRZwX8AE5+TSRuLQ1XZ3UVORAfUK4wQH+8lcXKbYgNvveu NIqZraIoMdHaf+TxG40WZfH1rKPbPxHaLU10zeLp3Beg6BanmR18oAMaHvXHRDQT f84CUzWcYCQdWKRnuXqiWMEYcoWRbWWQ+HxhV82NVhl6oDi+6OXr3rw1939ZUJ9l bBjnKjR1hPUjuAbA8uA8DnQcc2P8p9BpAI/ZCv6lEiBU/0J4mAGIVaapvNcex+V4 yHcJaN1n34yGYAIKDrpdBf1Ostcjyl3VpmMOqKhlEh4a64MEY9TEkPtYEkTX5rzo ynCu6i4uayjIZtVcwOOt4CjTvvzB9rui0dVce8+zZfCuHv0jObc+Mi/ol98R38pO 8wjk3pGwrJm2FMg4r2rkwOX5KNTqR3XDYHhH9VFRwnKZKUIYdUn3qQVYWy3VR2RA Nf0PYcYmSfP96pwqhDo5HL/XxGA8bYurd70v9CMLwPvzVxnWq0Pnao1tNbcdzl8x U6fW7y/mxMhZXJ8DuSXMhfFze4jWAq3VhpC6L0KnH4Al9f1uUo2c8Bvirsrh94yx hbVYJRfv7XDcJZN4ECA02/1Ig2/iqQ8qPHWEmGlaakaEUpoLsdjHybGIE264EAmE 0PdqnDQlS4v3sKVpZS9LTv+zBLf+2JG326A87fwGl/6c0vV2tHkJQkIEjTDZ4YU5 hsjXkXVNdojUHAJW0B785733USiW+dBr8yV7oO5s6VKlG912vVJL4IUGhO1AMKSR wi0ei7Khq2bSChtdk+XNhOya8LJf9C55U2Ft5QZ+B9YLcUjVL+32JseCbjXsejCL 4ZU2T91QoL0dyZAkAQa3TX99EK9Lu+g71Tp5u39ZM/6KK+e2lMdF+I+v7QfCI0C2 GworFifCCsB2kxWqfe7r+80cOA7aR81taN4Q4EJE+5n0INsx3PYUtZGqWpHUnCTR RBD7AA7Elkm8uG52fPDIDPyRceAqVvJ561LIwOO3hSbavBr9 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CFD95459DCCAE4E1

http://decryptor.cc/CFD95459DCCAE4E1

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d0fb6f4c608994c787f15ee3b5cc1297180687522ade080c07a708e55ce23de8.bin.exe.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d0fb6f4c608994c787f15ee3b5cc1297180687522ade080c07a708e55ce23de8.bin.exe.dll,#1
      2⤵
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:756
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1688
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1904

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/756-1-0x0000000000000000-mapping.dmp

    • memory/756-2-0x000007FEF6490000-0x000007FEF6E7C000-memory.dmp

      Filesize

      9.9MB

    • memory/756-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/756-4-0x000000001AB90000-0x000000001AB91000-memory.dmp

      Filesize

      4KB

    • memory/756-5-0x0000000002430000-0x0000000002431000-memory.dmp

      Filesize

      4KB

    • memory/756-6-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/756-7-0x000000001B6B0000-0x000000001B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1596-0-0x0000000000000000-mapping.dmp