Analysis

  • max time kernel
    129s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-12-2020 13:52

General

  • Target

    sodi_1.exe

  • Size

    696KB

  • MD5

    8445dfa4a84b7045a93cacfd54bbbc90

  • SHA1

    8b2ed1cac7b5cb0b71ef0fc7b4102ea07368e667

  • SHA256

    9c8047488afe121552ac8acd0594d1c677e10373ee1b49582d17dc96161f7feb

  • SHA512

    a791387940729acd0adef7300c93529a16492e0c3fe09f23c03301c7df70f3debf3fe44252bf0da591956492e632b137fdd54bb4afabb37f8f06aca132c81f14

Malware Config

Extracted

Path

C:\y42x39-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension y42x39. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7D031C38933EE26 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A7D031C38933EE26 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: b/iDb8yD3CPLliS7y3FLz5VUvNtGlYe12NZWEqvr4p14KxjVGWJ6JtwrbME84S4m /aeRkBMfZfQgto0IXbtpG7bpuoIX33F5407oTRCRXMmwUUFlH3o4/GpShV+5w5/0 hINEZ3/2op4bOiiKxmmkq0PRLghbNWyk20My12Tqf59GIDoYUiXIyAnFVEo1mkQa sfcyvhM/jDWW8swyh1RbxGpLM2cw3g5bYu6GhRfRg3ZFEWk9VSb85JGdMvpM4OLi 0iq4llJ8ik+I0+wlaDauRS8m0U3d89Q+c1qr7+/ZEAbC18iZO1OSSuEPnmHQMWwz l92NSimRn+ZsJckOhwcu5VGsdk/3Pi5D2ZqUocQg959tNtQ3WNr3+RfXPSs6HQu+ JswFnenjdtQQEYvcy5YvqUxPCRFmQ8yaeDdIl6MPzDnQzaGIZ4XAX8bJo1ZrV57u ca6U3hXNcyI/KA5Us5eiseKI6qTbKdlV5afePyoZlDiQwkr8+HyuRSNS3+ui6Tj8 U4CC8UCoaDYXyf1jFBTyfCBxwfJ4fWTNiuMKSlkJcLDPGbv3bn0j9SUhWHSd65Me eI5b0A5LTfPmo7zl8Uh3u84W1E2JQZ27R/Ett5C8kFtcM1RVGWxSqyc4g3tiI4+r f3qQj3ZzInhvKEOuu5LvaHUXSXWL3eM2yPbgCismHVEq1lemg62H5ThZ5c6ztijc 5/21gHHjx3seAMlJL2+U87HLM++B+/Fdbm6W3EZCZTWksXGCuN8Hhi3hO5K/Oss8 HjHsuz8DuoeJaUJdzCsvgFCQrFEMxRfcBABwqDGKJ0z0Msvws/+yMmiCgwIzh2sl cpZPXbekU+YDWj+FKctgq0n7PMJO9Mix0iGsy615TrGgKyASmfjLx+TF41/fJtNw CbnbEczV38FhhvZbgsdH81Fkr1L9cez/+do9dE6N4GrWbx6txDwdsckdh8ID8q0C lCow2+dJMS0rTcwmJtxEa4nPhZcRGTNLcuGzBrCowwiHitoyi8vpLHwMh0s9nHFo aMA0tJYvqIkzyTCZLkBb1gNvoV3n6zIGeC8cqSIEDlUqXgqzSsZbq+ifn25h/z/p fzhTHVAXmsJ6v/GoagUC1LIzoN0xiaG6UdMv01+y62H0XiVfGHMIjeEc+OMU+vU5 UQdYiRinucFahrHKPEP54jmduuoTvdVOnBVvqoCBrtuHIr5I724PErxMim6p7/rX HsLb0zuDRIA8eGbwfdeEXnUaKd/6mpu/Udxw7IKJ/B73Gn8Qb6yxYKmR/lFtrl1K FOuCfZGJueQVAIqfgdL0lw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7D031C38933EE26

http://decryptor.cc/A7D031C38933EE26

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sodi_1.exe
    "C:\Users\Admin\AppData\Local\Temp\sodi_1.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1316
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:984
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3976

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads