Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    20-08-2020 13:04

General

  • Target

    e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9.bin.exe

  • Size

    116KB

  • MD5

    d88e2100c2ac44892f475fe54deb89b9

  • SHA1

    c9fa8beacf4dbd9af7c520fd7f3ecc493acafbf8

  • SHA256

    e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9

  • SHA512

    b92c85f5a99da1b51878778d98d75a3895e048c80af678086252daceea2b72922b1177122a57a58891f9defd38e64887af1ad849074ebb4dab28aec0b305b592

Malware Config

Extracted

Path

C:\zo7r8-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Total Military Management ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension zo7r8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E16582DF25936703 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E16582DF25936703 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: cfF8EFs8fhsDbJfInPXfvxCXOClPDdMZOTUHCKSjYKcj5aC1fWB8cOGckgWsymB0 RMjUKerlRRz8iyM6lVmjKXGPcwqKJhDPtWxdA3T9loJeBKLTlPX6bp9++tz7vP8r agqeCx26z0Z8hGlafJOz/V9IRdAxdwpm5+Ek2H7GN1aUq6wI4nPW9DHV0L6Nt921 lXCsRJyUqoGhxD3oofXHmB/lQyV6zuL+1H0AzNA2GF4gNOqZpEN6OE79oVNYHVDP VqT5SnGivN9JZ9dEShJDl2noRhcHwdrb3ROdN/5Yz6vzLAoqbCjj1EPruiltlgY9 Y+lM7jqIm/K0pgnJCOHvqXFL3xQwGnIThu4Hef2M6bz5ijxI2yde2gm7VIcQLHpT 5kuLAZFSzZqSIK6BeAH8HZ4N5pqVHlff3D0mlFy7kdiRvw7yRGkz558sOknetj7C 3KqLiobuR5sTwfim8khHRypYcjS3mcGtxbQbZzkDuU0YRxHOOpKAEm1TzZS4hgHX Rx2QlvuDVbVUCnYV/6akqvMtSWBhXIWq6yWKab98r4TDCBWWbB8RMbQer11+RHKq fRNFaaBwcRJR6hP6X8ni8UhL8yOz3CcPoVEedXXmCHuF1UFxup9rUtwdEU4WfAj8 P27Ael88tlxhk3qjz5jsTypZjO81/jGNpKFTxjInReEPKXFKpvJZz1P7KRRKvxJT TVeCXHQRYBXHvA2I6GQvjopgVT2T6pnWeunodC6liWv+gONmaERzirR7qYfVPaZu TBuqzq2txKHRpXuAB+30bD9DPX+wZg+9PS1gt48p8cs0nKA+jIDwHgZCHgQ4/mj8 gH9OSnvaBHzugM6r4gjsNuxAAcIQskmvCkCmKcyOldsXbDfZGBxswdyzk+Nx/9lj LcS4YiHsk+H0v3sdvOAhJgDlpWCw14zIMqxRuNzIKKkTapRSVeoGTAiTfvzsHXJe cTdnz+1gIJHuqVCpzWQxY2/q6TtiTCYcCOr1IvHx5DZUuxpWVV4sDAYIFZBd2RsB V+q7CsRw+P0ygjdB9LpxHELr8nQ55IcyRS0BhcS8a5R8sFdF4BHfItk60OJ0r9qe 1B5uk+zVsQ08btd2lDvx2qQ0tTdNKvYjbhxwo599w2LM6rZwqftnHobbPvWE+G+v yklPZj+b9CzgYPwfn7grEo7wGjHNrWVPX0ZrTc3SBT16u0fi/PRA0oDg077i1de2 FC8RWjsMS5VpgzQ348uQqTIn4nQ/rEmh9Wf9pRl8OZ1lVjhnAKPYQ50uYGkfmlpv FpglFOVA1zBYmdjGZ9Q= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\e0b8bc41f54e982571d878303f3714a2b71985e37abe8f2c84c04139927b31a9.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3612
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3792
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3612-0-0x0000000000000000-mapping.dmp

    • memory/3612-1-0x00007FFCC2140000-0x00007FFCC2B2C000-memory.dmp

      Filesize

      9.9MB

    • memory/3612-2-0x000002137A030000-0x000002137A031000-memory.dmp

      Filesize

      4KB

    • memory/3612-3-0x000002137A1E0000-0x000002137A1E1000-memory.dmp

      Filesize

      4KB