Analysis

  • max time kernel
    32s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-02-2021 09:58

General

  • Target

    7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68.exe

  • Size

    561KB

  • MD5

    23c745730da3466dc1e899d4420fc22d

  • SHA1

    ce0c8814d7630f8636ffd73f8408a36dc0e1ca4d

  • SHA256

    7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68

  • SHA512

    1d72b6f6299b56de01f4cc02becbfd38b27dda086583e54a9d9917f4ed2f6ec17d15a73554eff55ae5df83a1b3ce9839ed5f484109535eec2e5c550dd2f2409e

Score
10/10

Malware Config

Extracted

Path

C:\v8rvt82fty-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome PRIME MOTOR GROUP ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension v8rvt82fty. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Downloaded your data! Public information! [+] We downloaded 100Gb of your information. If you don't pay, we publish full archive here: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/115?s=ec1ef249d454fc83514a22ac85fdf72b [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/189C13C557D9D018 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/189C13C557D9D018 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Xg1aVh7H20iGqNZfa3KNqEdBYIAekOTPfFJVHYzNVmZdgHv1In/pCPt+S5uork9Z 475ul+eIGjZfHgWnC3cZDvtS4X++UorKqVy30iw7tex426NnLDU3kAhQin4n4R4w /52RVbUmsdXTiGsJFue+JPcxhDsqp900J6E8EjFKA2cBAeHLH+PY524SAmrGRujB XnLTNqN65AdORI0e4q5EgQnFOKwFnhrGzhbSIurBbrYO7k9CRP2zzAz1UaIq/MTx y4lYLQ7GkfnX189eE3cjdV7v6XyP2HGaV6MUn6b60x8XAMPf4KmEAza23jSJ9Hse 4Nyb37XBja/cfZnTw2/5ikpFUZ0/l2GLwgogEdGlnqarvcn7Sup6vB2r/LjGYn4A jH62Ua2Vdk7ph75m/UKCQaeP61zKKJR3x886yeY3RnB7Nfg1OLw/xZQwSTFcwhFY 7tFAqA1GE4fqjjXmDA6C6Bu1cBmMyHl1u9u4gUVKjAZn73Ti47hmWO3PcDgbvfxH C9qNEniu3JVL3PDSYl8sUldD/mBZze558N1atOtOTjgjYMUI8eLwMjShqMadh8ub ZbY2dukuH7JijU04DHgQVTwWhrga0Pgm732PS06+F7TuXUe61vgp+G2eZo6DT11Q f2If3TuuFA3b5Nybyp0vauoCfmJDpVmUwgPvBWucFJYoIuC29gPwzuzWUsw4Teli OPtAA+c95Ij6bviRruhKzyCcgdjSZboCCwgr97zgh11mrBKDQmzhRMNsee6Adnpa mgy/wf8vEj8RcjiQeH9d00hMQtbd6os3k+7S/lugyIc8OSBgnjASMQJo5fshE0GM yaMo4+lnlDiZK/5wCzCoNha5rrgHd90c8VZV09GZqF/bmqKrgwU2xYDg/m+2fPsg D/nj0YpQs1OEDgqk4EbAuTdckecuz6U4cBhcTVuYHKemZIpL10hTDIV59YHoMMKn OR5y3vS6WlzmJL1eh/7g055sV75Gn0rcit2OfijBwMgQr7zDlsQALbhdRdwk/ufF vcO25ye9LISg8Ksaomc1zWZXbPuGdJxkqMHAWiv6Y+t+tJVbw0Q6lFUeyxeK4P0l YF7M/pNpqb9t9qy5Mcr0YxOoHTRTOlZdLO5cVrlo99tmhBWqmBNc1b/1odhl93NO CfQvUHaKKMW4WmrjOJBvwHIhFEW5GP7v+dmNZbPKynmFISrWNmOLhjDfguy8tYst kse/IMxTpM1L1uJNaJacMMxj7qyFo36iNTEy3TlUoAbW4y+FHh08PsBiQgD5cYJ3 k86kRtxWwAWVAzqvym/A6f8s1COdMvQt ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/189C13C557D9D018

http://decryptor.cc/189C13C557D9D018

Extracted

Family

sodinokibi

C2

aarvorg.com

dramagickcom.wordpress.com

modamilyon.com

devlaur.com

psc.de

americafirstcommittee.org

ostheimer.at

patrickfoundation.net

deoudedorpskernnoordwijk.nl

greenpark.ch

merzi.info

hypozentrum.com

iwr.nl

triggi.de

insidegarage.pl

nativeformulas.com

retroearthstudio.com

layrshift.eu

stingraybeach.com

ausbeverage.com.au

Attributes
  • pid

    $2a$10$HkGWU19jchMZucMO1CskOeQ3CMFGC/XK9ad91ZajdP/aBULE62o02

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome PRIME MOTOR GROUP ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Downloaded your data! Public information! [+] We downloaded 100Gb of your information. If you don't pay, we publish full archive here: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/115?s=ec1ef249d454fc83514a22ac85fdf72b [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4973

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68.exe
    "C:\Users\Admin\AppData\Local\Temp\7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68.exe
      "C:\Users\Admin\AppData\Local\Temp\7d5677cb8a7bccdf0f89fdeec77d10f72bb652e1e612576c7b439e6408a12a68.exe"
      2⤵
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3204
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2652
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2924

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/640-3-0x0000000002430000-0x00000000024AB000-memory.dmp
      Filesize

      492KB

    • memory/640-2-0x0000000000630000-0x0000000000631000-memory.dmp
      Filesize

      4KB

    • memory/640-7-0x00000000024B0000-0x000000000263E000-memory.dmp
      Filesize

      1.6MB

    • memory/3204-13-0x0000011C57720000-0x0000011C57721000-memory.dmp
      Filesize

      4KB

    • memory/3204-16-0x0000011C3B696000-0x0000011C3B698000-memory.dmp
      Filesize

      8KB

    • memory/3204-15-0x0000011C3B693000-0x0000011C3B695000-memory.dmp
      Filesize

      8KB

    • memory/3204-14-0x0000011C3B690000-0x0000011C3B692000-memory.dmp
      Filesize

      8KB

    • memory/3204-10-0x0000000000000000-mapping.dmp
    • memory/3204-11-0x00007FFC351F0000-0x00007FFC35BDC000-memory.dmp
      Filesize

      9.9MB

    • memory/3204-12-0x0000011C3CFC0000-0x0000011C3CFC1000-memory.dmp
      Filesize

      4KB

    • memory/3776-5-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/3776-9-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/3776-8-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/3776-4-0x0000000000000000-mapping.dmp