Resubmissions

20-12-2020 14:44

201220-hm8p7lq23n 10

04-12-2020 16:20

201204-bapf2923ns 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-12-2020 16:20

General

  • Target

    a060d113134d0e905a7c00d0131d907f042b94323987b1ce2d24fb9e87bda148.exe

  • Size

    117KB

  • MD5

    1aa4a440dbb64066a9d2ffeb16618121

  • SHA1

    e0130f08665b53e1fec96c2de8de97f7796b9fad

  • SHA256

    a060d113134d0e905a7c00d0131d907f042b94323987b1ce2d24fb9e87bda148

  • SHA512

    3a594e707c2c676cc64f441a03b9b0560f6ec1155fdad802c1868dc686acfdc64ea697f3e79d522dae2e2a107159594ee85e3d67a3a1f4990452c6020b0c6820

Score
10/10

Malware Config

Extracted

Path

C:\51d1l1v-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 51d1l1v. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B55A0BB24A5FD926 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B55A0BB24A5FD926 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: /mOmbhmgZMkJhkZsZ3FPOQHubJk82l/CItu6mYURgKnkmLYAklVJEaVPdnNgTlmo 52a1tEYq3PST1yK9ysus8jE+jLjhQUL1lN0oSveSWhqj7NUE4dzdR8bOJ8MsVs+k 5BFTnA69lpsjPeC5OZVxw5w7z1x1ggGyWyVVDmmwfFBzuQ8fbZ3uM4sQrS8whm3D uj0w8oDeY41pGlLrIvWjCeJt9v8zMeENRJL410ZVbNF8CoUW/7pPvyCo1QXrQ4YL MBq78HYK3NDTyY2KM1NQ7pYYF5G+ji99E3tG1gJfLnrCxdWz70patSkLiU0GbMA6 4xnltKQ2ZxS7Zk8726aym0RYxplGHKGgNkVdvNS8kyAVPvD6qRg0khOozr1UIhma f5QO8IXOnqqcRqAnbYL9KHzODg6V9Lr1Ivnv6JFZDxx/itDdZ2StPV3hLoAKbJpN TV14rEmnEj3d/GfwLHQcZz1w+0DMJ9RGQLV4TAVpKSjm1W5H/LwihAjasVGmyMMJ srBZAc3nm+CNbDKLiaxsywPdc1tRQBGnlfsnpCVR16kXd8Lm7fNWJAPbhtwtx8KL KR6WAWJaq+HGiMKLqkvBi3YAeHceEMJ7q/vVVYb7vLFfZZpr1uHzQYAWQhRqmsFD 2+KZOc0GUJznr8dRrQy9RS5EquTJ5R9s20dZ5Wa6cLag+dQU6XtFlmqc/h3wkNpJ RkmxRfc+JispUP/5f0bWBSdZshNIOHwMyWzwIyH4rGr7TybdjrG56bluGQPylODS vWo/eCqg7pFFuvW45o278Ypw2oPYlQcnnC4DWvUBDW5Y58wev5c9kuqE0x3ueu7p yzgTMGkgNJIBZWemKwjdp0jUsiJ20t/EdG+flh/P2Wi0OLXvm8gKGgBNYTFhcYhc oSUx/JLuaBoVKPQ99hVaBJ5KKbsL5ckQZMu7j5ZdU3xB47I6KcvGaVtEucPdTgwQ Me6/R+s90D8ejHBNJyPp3ykC3cLYxkTzPkHxiPn2RqsRK1OeIfUvsH07Z4eC0LYr h3/1EWK6WCMfnOKCa9He10ST9vCBjL496TEHIzmxHVgV7aoI7L3fw9IJ5YbzvslW x++7Vald8yvgNPjUfHBwPSalrJuCKV6mrnmWVfHjblg48D9v2p0K6/a0T+6AHDYy M0EUoXfhgzM/sLvLsT0dvmxsT5T32HqzowZ04wbxpFMuVc9zteVQ/8A8GVNtAwp0 aNja+h1V+BewBTTdyuqUdU80ZqGIpKxMrKMc1cKnPbRvxLONuBhbl3Gvg+SrKLTo /QzzE1FBf9IexUPQSmOCZ23I ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B55A0BB24A5FD926

http://decryptor.cc/B55A0BB24A5FD926

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a060d113134d0e905a7c00d0131d907f042b94323987b1ce2d24fb9e87bda148.exe
    "C:\Users\Admin\AppData\Local\Temp\a060d113134d0e905a7c00d0131d907f042b94323987b1ce2d24fb9e87bda148.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4068
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3864
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3428
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\51d1l1v-readme.txt
      1⤵
        PID:3128

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Desktop\51d1l1v-readme.txt
        MD5

        ce34d4692318b88df168c253b7ac9feb

        SHA1

        95bea404c555779fa6ee32a6f64adf6f8c9d860a

        SHA256

        e6e78a5e46b5f3c34e72fba1fe03acf6a5b3b1d2ad16b6e34d6e040f66a964b8

        SHA512

        48c86e70570dba7a46aacf66241090108492cf5e918390af38c373c41e13722e3d62f0d05b245e2f0b359abdba898bd9a8e3618ba6171280d84509be7a95b477