Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 19:27

General

  • Target

    file.dll

  • Size

    164KB

  • MD5

    7d113ca1ae3f5d652e95a7235bb5f500

  • SHA1

    ac1a058579d7fc2795b114e9f5b127d16c6cb8f2

  • SHA256

    e98671b2d66ed8e660d8653d19773ca46706a43c3d489b947df1fd4b0cefce41

  • SHA512

    80bb2ca4475afe8d9ce35c38ab4c25358f07aea28f7d1c7034c64e4cb17614760cfd836869b5dc7bb5834b8075178e2831c5a1741698262910836d1d83659a18

Malware Config

Extracted

Path

C:\8lyuypc099-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 8lyuypc099. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8A96FAC3F1D0657E 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/8A96FAC3F1D0657E Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Tlu6/aH37QfmX0RBSlzpuWSED1dBB8HyPlB2+aeIWmQzo+66IXiVNWvUziQUjQ80 LHQx2BYLygd815JobN6KiskavyqmkSk4h90TZtNs5NTQ7yeLHcpwJlr1MmvEccIG ircHEspTX9vE3/760j1vE3WLcbk42AxmjcPlaV2h7dG4GuiefdjYXoLy4cdflsvE 6chjl4iFel5X7nTSVUedR7RoGvTeaa77n1Zd3vmRKRsLCNPLRLcnxkfWpL9MIb/8 ko0KgZK2qaag161AbJcmlewZATxiXbgn3V5Wrea99CfQ8+ikr7jDPsifD4woLzM7 UhmwTJNWg9gxo9Qswz9SjxgiWZ4bqCUV62lhtQARYHrPqNkYmutPyiKYey4FC6RA I8KQ00hlp5yvXg4INW79v+bGatwIf1faTtKPHI1hnIoNKpHd1rvgQOPd0G2xP9vw GaLybXZac/EvQ2Qze38AeQq/KqAyCyavIKuYgzA3hOk9BBpEQt4ecrhAWrva4LLw IinV5qcbRsnshH7/T+4em0NtG7WPK+mdXtLDkpfgAz8lpBQBxtMcT28ckX+INCxK scZ+9Bmag+2Rq2q5ndEsZdOyZaqTdO7CQ9/h+Ligpowstuq7Q6Ka7VUtfYqTJQvf gGkzFGFV7P1iu+f1Qb8q/m6MJdQ3NKQKMLmKvYc15sawSZJZFBO8Q+i3XLPzVIWN cchy7ey/w8v0MIfGNx/ytWqIWVJev2jsMGpTgCa8M3fZLlscuDPptwjE6pteiMc3 us3nWZARlRBq2Xy4M6V8re5q/zRR1SjRsfrVnSqGaDcFUQjqjqYLAYNaXwuI77P1 2oauOosTR2k4bqp5L5/cdPYxzKxiiZrbUpWIbjfLCvW3l1GiZbeP1Ldi9oZU8Lqb HyeD8X5akFbcy4EmE3SyprcrTycnR4zlp7b9DLLvgT5eHht0Cy1yh6AjH4mPkva/ DjjvY2Zh66+TpLgaDqkxzUkMevoXf3f0+vA/GH/JzV0u4LxedQbTxTd9+8/xyE2C K+sR9TK+ALtnvF7G+o/nvhfmtS0GHoOnXL4w4qT+uNgHtX2rpV5T2oLrn1/Q7ZMP l7qHPvjopWp3GNlcB4zwBqsvpiMtDzC9kRv4AEwYy1Ze2mTlMRNdPQimCQvm5S3o ewadCg== Extension name: 8lyuypc099 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8A96FAC3F1D0657E

http://decryptor.cc/8A96FAC3F1D0657E

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 63 IoCs
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\file.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3992
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:424
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:4080

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1112-0-0x0000000000000000-mapping.dmp
    • memory/3992-1-0x0000000000000000-mapping.dmp
    • memory/3992-2-0x00007FFC33590000-0x00007FFC33F7C000-memory.dmp
      Filesize

      9.9MB

    • memory/3992-3-0x0000020CA39D0000-0x0000020CA39D1000-memory.dmp
      Filesize

      4KB

    • memory/3992-4-0x0000020CA3B80000-0x0000020CA3B81000-memory.dmp
      Filesize

      4KB