Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 15:27

General

  • Target

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe

  • Size

    157KB

  • MD5

    b488bdeeaeda94a273e4746db0082841

  • SHA1

    5dac89d5ecc2794b3fc084416a78c965c2be0d2a

  • SHA256

    139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548

  • SHA512

    2b62f0e0b017ed3d2dc7103d2020604f15f95449ba842bba18f886f9e1dcc977c459c53d1e6e7abfe6b99fc3dde24f5cc7a848c92443d1daf3574ef6f0263284

Malware Config

Extracted

Path

C:\odt\62n690ip3.info.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 62n690ip3 extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7E4CE5FC33369BBF Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/7E4CE5FC33369BBF Page will ask you for the key, here it is: IQWTTIX3GXJa+DY3YSd0SuARrD99Z1BviT/LijIzyB4sKz1yX01EqH9uLuXPeo8M l8uzw+ODCFrhdkgPQ2Ab4qVNk2hbEd6T0li2mGGlWvcaGLVMyaZFWnkAedI1NAfa GAHKtEEMrYa5YbZAJpm3e72fh/r+T3EBu4/Y6lDg5Bd/6bT0aLayaY0Au3CRtpWG pBBi5bknC2Kv8xiYyxnNexU4duXeIDPoACsh52guZp7KvFh3xrIMddwdBLmH9vMr iuIfIpZHGFXl0Hxn0B5/QeOFFnQnAFK1Bbwah3hczDAscL2+pGvtLyQ3sHtDJRUl N1VEY5ogQI8DvYyMHcLpB8CdCmUkbw7av9Np2jB6v/R9GkzuekXWrKuVGNC5cdXs oy5pPCfZFXyzPx05ir7BN+p9znXR/ptkNzSglpf3uW04hMyzejAQex91Jmh4AKCj eKlHJWOOLqvcejR0G8VJdynlVWGXf3UuxveHFqSx+AeCATsdgRplpELoyDjOou+f Af1WRzMIGxOgVy8UuU+h2K0PIMvKHjErst0W+EpPT0MgMQGnbfB5xWvO4wF5eYS7 IQmPaiG3g4ZN4B6YYU86IBD3RFiupke8deA8vFNh/xsjA4+PL5b1psLN5yYVIGwi 2V6tqJDOgijwpZQmDx2iDKx4wCNuUrJBtc05puSq8e3e4DxdIDBxbWJxQRSL4tos ncvz3cCd9wehVxV/ZuzTjCeCdJtxplgBVBmcHHwQnPdjm1i72/I3kz8HFJ3CENCo mQHF12dawGWVvI7t0NijdCdn/Y8Ot94sbHkIUqrAlkFbQCubScMR+lcF1oLenX0P lxFWUC/q696BPDiHRIu6TcimjygH/Ua5YXYOdyT408PyBSg2mmoCq9eCTFkpSbDU hfdTn/dGH7ZufXQuEtfsr0VEaKsRL+nsGRMcrmgsajVGDDe7R0o1xRm3qaeHCNkt p3bU1ZYXyr+88f54W4VyliR+K6oupT9FRMAepdhLNQKnxUpnA2cl1cvnfLBp84CG buF12m+h16sR84VV5rCUXN4b3GEBIpEKYSguyKXSp6q5GHxnYhJMgtLt2or4xFDU QZbta3OtTNA=
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7E4CE5FC33369BBF

http://decryptor.top/7E4CE5FC33369BBF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2108 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe
    "C:\Users\Admin\AppData\Local\Temp\139a7d6656feebe539b2cb94b0729602f6218f54fb5b7531b58cfe040f180548.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:3816
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:536

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3196-0-0x0000000000000000-mapping.dmp
  • memory/3816-1-0x0000000000000000-mapping.dmp