Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    20-08-2020 13:04

General

  • Target

    d91fb28bbaf54e85e5a87e608c2bb630e7be06815f17541d680823faab4a8fb5.bin.exe.dll

  • Size

    116KB

  • MD5

    f8c9fd29c9cded8ceda5876b41666f70

  • SHA1

    35d95ecbdb2045906e7d61f10495af1a009b413e

  • SHA256

    d91fb28bbaf54e85e5a87e608c2bb630e7be06815f17541d680823faab4a8fb5

  • SHA512

    c7f44b93315e606d75096e2fd54a826bd808e30ea9344f82ceb9238b608f6ff6e95619c7c40a7253b10d9b1ab8d4184be726d6f0c3f114e3986eac74a8491197

Malware Config

Extracted

Path

C:\n2931-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension n2931. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4BE932E20F8F5FDB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/4BE932E20F8F5FDB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NGYmFNpmjQb+0pvAdEuEHuKUVh7HxAd8QRqDY6qjEJXlVAR8+WcsT89vmH8kufw3 FEiD6dPtWxV+ds56I77ohc4KkAgNhjkP9zA3EjVVlYmRKKv3FQxxDBxhycKLvYO4 BHKQcfo6XQCcThISbsAETJJS/ie0uodroMfwG+haEHvB6hffcW1wLFCdF5E3m2PM q+LdMQsL9KE+mZGkOWujq/6EFJVCCHvzvqslF6l7sxb3SKHTlzbKv765U7YZU/aL +XguxPAD/C4XzQy8W2I91xh1CreSZzixLIw+ynbWvYIAbi1RVFsPA80RaXN0QNZp iTNsAAORXkFInQHdHUgDpKgufGomasAxdSdonKSYF6oLyQOSUscicxnAfbs533pS 4TJklxDE3Aw2bcC7DnawmPjW2RZcq2TpQQZqRhAbVTM6RBnML4ya8FfbCl5T7rid D4y+ORV0SpCfxJ62rl9gNhKL6zDWCkrIz1KOltCBRlT0HOgSX6pweiHulGNN3I2m atBSgNFKcgiubHR/PHfemCqP0a0y8JdLEhEreWHdmlvXPD+Mt9XTDP9FAnJzmzsX 4qORrl3IKhcFwpaP5Cu3CHYThvR4BRzkdPIoPwvIarmi/gSlqyrNu8r/Od77SI5r e1zoIhPvc9jcweP3OiEvPamGqu7MB7U1O3yZoafvGuZv7ot2079H8Q04UptEQO7/ O5p+4pEdqEN/rXcIdm15g5rvxQ00kn15QEpN8IuIkMwxFq9H8SCxXEy1aO1GpC/+ Lp5h5Wj9ek6H0g/hwW2v7cOsqscoDBWhPA8zDEtDiv46nKCP8ej/LiE1k6CkaxqZ 0zTBGsOES4S8MVySviYrDvaCnu4uBudpycSCo3HtAuF4Pn6gVfG6r/jPGjfAK6DG HBNpr6RjYC4cuud2l7Eq6v8izomOg5tNHD2NjhHwP4jxnLyyYZmJxfVDXPCW7xlX Tg/9DWAr5yrETSo7mRQNLo1ILAiNWpdoC3K+HtrTAGuABwy2guQ0lDRru77PEF2c 2tNLEVdZqDeA4Ig8u9VeH8QTlreHkNcJQsZsGX7ttAe1wKQFH9reh08Y28RHfWLt b2pJecmsMX6dq8PUvaADU0zXjZyxk3ARvSfCWaXQCnxAuzx7iQbqaqJO0cMpBxff vLfdx7Drl4EPUgXKy3pFqSUV7X2ccn2cJSOqUdRs/5NbwTO98xIO9vxqcK9Nphxz IVatYuNApSaf/RVB73j6e3iDJIyx4bjUau/Ef5WXMAfw4IpT0mh+pRp3TVLiH1UV JPg1fbLnBmGB6LVlBpM= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4BE932E20F8F5FDB

http://decryptor.cc/4BE932E20F8F5FDB

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 129 IoCs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d91fb28bbaf54e85e5a87e608c2bb630e7be06815f17541d680823faab4a8fb5.bin.exe.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d91fb28bbaf54e85e5a87e608c2bb630e7be06815f17541d680823faab4a8fb5.bin.exe.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3776
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:3400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/336-0-0x0000000000000000-mapping.dmp

    • memory/2972-1-0x0000000000000000-mapping.dmp

    • memory/2972-2-0x00007FFFBC9F0000-0x00007FFFBD3DC000-memory.dmp

      Filesize

      9.9MB

    • memory/2972-3-0x00000164E9AE0000-0x00000164E9AE1000-memory.dmp

      Filesize

      4KB

    • memory/2972-4-0x00000164EC1E0000-0x00000164EC1E1000-memory.dmp

      Filesize

      4KB