Analysis

  • max time kernel
    22s
  • max time network
    106s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-01-2021 15:08

General

  • Target

    Windows Defender.bin.exe

  • Size

    116KB

  • MD5

    310813a05dcacc4b8287477f6e73aaad

  • SHA1

    3bbf747c1ad1b871914bf27b1ddbb1200734b940

  • SHA256

    1dcd846e9efd3f8de3c9e105888940d62e5097a2fedc59f460857e9959ebebfd

  • SHA512

    5275f60f444db888ecce39cbb294827dfd294a68d81e1c529c7440547d809a652fe90510d7631725650347e4780064f65b41d9c1f2ce2ed3ff34d892eef7bef4

Score
10/10

Malware Config

Extracted

Path

C:\z7280tg-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension z7280tg. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/288FFD12486B074C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/288FFD12486B074C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: FxpSJpS7dBoAYx73qyIm49KTSgOwgGQ8T5DuP5J4Em0tBbA1e42JKC53Mga6wL6G Qyki5ERkQC42h2G4E5nhte7QXy7hXkyWiVa95Yu91JheDeddzr/NGC7NXETSEEXv Y0twyEVmVEBJ9cEZrEPve39ljpsD70HNWicNQTUV2mQxOIb0+ERGgrao10SdTvWR H53r04jcF60oVBLKyhyaezUXynfKzkuIlX51qTPEAmyEzvxCgBeXBlA5EDApdmCp gfTsgs/XQtcV3iQIBI3Qm9kC4cFZ7gXb0z2Z9kEwPqkWIjBRwxLG4DGWcj5CbzVS WgGTD/LaZ1vhtGJbxsihbUxNHgfcD8cssgxAVMRD1kCISjCzFAf+P/fZhl15dyBn PskVFZIr9FtF4zT53e1gckJmJWXuJf7WcVHi6YOqskL38Kr/SqXK4MnscZ2SydcM Ko0GE9iXDYmXWtJcPsFB13NAMZrxX0XkEQO9c92p7wf0oN1CqdohB3hcGnjDTfal 4ZTigRvzD4IDSAvjvEaSlGUxHyB7OT/y7QCHPIhfpY1GVdcGzFqAOB7sQ/e0cavU XFmhTDnN+YEstrClgeHfdJ9AxgJ+6Ne84hSztWLR+OkaJq9tiNrM9kJbAVhmbt0c AJ+DVwWbwbUkvie7S8FcJOc5dICHAXh7mtDj1L9qAKm+QEe36WwWm0yVQrOvAReg +vYVaOOdYSgO77OxqMBTv/nVVuLPcnOOwZIa+5BQfwUAYfhgGh78PbqLYE3S8wXE 7bZ1BXDTyFPweYswLOE2pah3jgK7N54acK+avyULftGrLuk7z9v97UDJPvlXyGIu 4693LV2evzGZlN1tcPUXSUo81/n5UNxz4FDsk3yYwd/HFoR+akPi2acM+mpttBAI QPffKFHXGkw3H6PTmqHag6p7MuQFlFpVf6a3QxrsJ01ATtKEAuaPzbaMASooSD3k TBwDRTxJndK5Gjr+vSQOGM+7cW10qPVjsY798zG6CYpHpUmQgs2qT+uBXTC8mVBg 6wYgOwNP3K+/4tdvV4PkEgv2S91UDBuOSDzi2snHGgj8IMbSQ9D9goiF0xTS/t6f 5Uyret6UqMhnhbKUPBKvIfXWfWYf6ESIaP9jQalerK7V2HMQ3LuGc20k1fOMTKR5 T7q2oJYGPHwqbUURrn/WNU0V+M6OOUyfBV6znrei/RWBCXD1g85zjAFhVZXIml0i Jun97NeCSqvDcrWpJmJCS+oye14vf8/ecOmOIAtFIZsP43W9BLv4er4eD3QRa4n9 hGi5660VbKFj/ipEhSh3Te5V ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/288FFD12486B074C

http://decryptor.cc/288FFD12486B074C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Windows Defender.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Windows Defender.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4764
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3908
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2160

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads