Analysis

  • max time kernel
    59s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-02-2021 13:22

General

  • Target

    B40CA0BFB7AEC1C1B4218B98529B580B.file.dll

  • Size

    745KB

  • MD5

    b40ca0bfb7aec1c1b4218b98529b580b

  • SHA1

    5615f11ca85cdf2d5cd186028c60a21fdb6d7f72

  • SHA256

    188b6a98ef67f6d79300062641e73e9ee5ec1c4172fe1cd91c7e7de7434c24dc

  • SHA512

    69c4e6f306bb4e254c49b687ff227f93aa649444be29b7de2ed8f0b09637970b2d4e7bc10d6cfbec1ab753db23b41d56bb4e947159319790a9f1bf31ebf24611

Score
10/10

Malware Config

Extracted

Path

C:\8rj1l91g-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8rj1l91g. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B5371DADB7A7051A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/B5371DADB7A7051A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: h3oslAqTzDmt7PwjUpeIh5tuNQwp+CiKhpitJFK8E3flJO1jVizSvyAJRERKpWWj 6PdOAXpz68rF3ZKmfsAkAjFc5BqR0oBg6ieXNHXRzn38Q510wFQy7kOS0bf0f3lB ilAthZbZzj0VwyLBuff8N45bWmz44fSBqM7KoBJF4rzdnTriIwMJm+BjZJ8zRdMC XbbtuPT9L+v5/30wIaCmgh6WLEtF03ZTHP0TcDoO5Jr5BLg0v8vEHZBnUBqktioq GN1EqtPh81y1yiv7oA9ReofbRWK3xJVwqPPEMGmX7+u29Dy/j02uh5NR1qI7HkEy Qg6l70b9dOHA4q+JMki8iMZVao23ZufSlaPjWpe9iFVQ7YeR/o6BUBCUYCEITN6o Y9dFgdU0DC060yZm/g0GSpPTRCgVmRfr+/WpfYjCv8I795IkKgMQjnW9OjegzLI9 qZl4n/BrLOOldLclKy6DNJW91FeLDRKmdVt0uGx24sUyj6hLrlO85eEUzhbLFdaH 0Oq7JifZxC6r5ebSsIsiMwrqXAncDA67AT0vffAU9GeYvTMoyFIonEg/EUBWA65a 1KojSsfDcJWoG7f8sSJW9iWyAbmmusI4plEdf1YJqmOfvbTHsA5t+051AsRBCPXF A9t0RnJOSqKRDN7gJB+SuUmqKI1VXlyRI7eolNd8qpnWJ1qHDj9OtUFUo4PEAh3Y uaL3o/6yqz0b5TRSXjfkhg5byThYO4gqUy4xOnqhvL6PicPFxNEEyH4W+9vNFhL9 NHTwB3FDtx5lVImr7kf+9KRsySGsoI4UZHtrL/kt08jbaGaVsa36WYiZNth8DQZt OLCj2JCzrFVlEZLme09gHBk7eoZ2PbMZ57vu8fn2Syp+QfI2QaX/mlWwEhDAEhI6 Le8s5y0Yp3VoM7EV3tP+eGNpFNsa9R9cAZUGM/PnY5FpUzAV5HYji9ok5M86BuGR bNFm7MTNvHMN0bTILyZ0PaQ8RFwrS2d8ZWempvW3lTzpnKXCLCNCIYXrIy5vBAwJ O01x1vgzlMt7XUTrYttwAnoi+Rd6XRgu8bX00bkD/uB17OnVAoD0WZzSS6TtFfKH BG0jJ/MThFthiMG400wNNsm8KkC3nNkPquLoJKyOruDSVy39XgeQuS6q7QjDzWjI iwCpFO9nFW/SXtAMN/jejK2tWAvIfOIUCRRfZsMcBiS8EetPQPpzLCrEsaHDUe7k SGnz6WrWQrWeWyt21zq+pt/ulov+bglhhYBHy2ZAZjdq/PtJoOTdtEO3i1dp1PVA L90FRRXxaDAZNSu2RSdD1AytZw8= =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B5371DADB7A7051A

http://decoder.re/B5371DADB7A7051A

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B40CA0BFB7AEC1C1B4218B98529B580B.file.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\B40CA0BFB7AEC1C1B4218B98529B580B.file.dll
      2⤵
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1808
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3348
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2284

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1808-2-0x0000000000000000-mapping.dmp
    • memory/1808-4-0x0000000000400000-0x000000000054D000-memory.dmp
      Filesize

      1.3MB

    • memory/1808-3-0x00000000007D0000-0x00000000007D1000-memory.dmp
      Filesize

      4KB