Resubmissions

11-08-2024 04:29

240811-e4cpqavfmp 10

11-08-2024 02:35

240811-c2187avfqa 10

18-02-2021 14:36

210218-e988k496be 10

Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-02-2021 14:36

General

  • Target

    2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.bin.exe

  • Size

    118KB

  • MD5

    9c08dfc58885a9a7beca989ea5ee9108

  • SHA1

    ce2f51348da7a19dbf0e79b64f9eb8e46f45efa3

  • SHA256

    2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e

  • SHA512

    34cf39e4976f264f31b3236cca87aeca04ebc447fe99b35bbb72dd126462eed78310954fcdebab48b1f3ad9eaf5efe22ad8405b12d80ddd357244138067a1ae2

Malware Config

Extracted

Path

C:\fx2721bff-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension fx2721bff. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Data leak [+] First of all we have uploaded more then 300 GB archived data from \\UDATA. Example of data: - Accounting - Finance - Personal Data - Banking data - Strategic sourcing - Management - Projects, plans - Immigrants info - Confidential files And more other... Our blog: http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ Read what happens to those who do not pay. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/250294D53AEAEDEC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/250294D53AEAEDEC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WHHZodc4m9rMYK49zFf8wX3IxDFb7cFIUavq410ZFDVLIz1i2Pw6EJmIwG7c5NG6 Gb9+8O8yZa/rdo/EwM7/PSzA6sAuiM8Gk7e7OORu6B/CC1mROejX1PaV2WQ+w2lC vEtrWZ2RsT+9vR9XNUYS9l/snGnKLmXb2SW9PGeITDwXNENFrHrsXgIU6Ky4Rcse mKMMy0YEWh3wHiaqupr5Ye5sWqcSJke29tw1l15T9i0BJzmt60ZMm2tJzAANC8zI 7h6PqqB4MCf7QQjXGxeap9fs32uJP5Tfc93hlYW2QLaY8VsDVI+PO5NsWikxnfUW s3I5OBZbJ9IUEZYcCoI1EXIURV3p3gdpQGe0sfDC20U01adHhoHBHWsH+St50R5a RxmGxyfM15Nucigx86WR5+7kpFceyA0Xb4R9pjZfj5uaWRCMw0mXlkiv2bbnbXBA ZbYivgVmckTcGpJn0w4gaj6stLLT5981/zglMM6CQs+H6CZr8uBCN2630+cog3/g NlC1abFgvMFTZ7g0Y4rpu/nTm9dH2yUQ32aZq03/V8Kows4nRISHKf1mxygGw/tL m42yfUEjplGIhpHmliJlqpL3E/hTwIbwU6Dv1xH4+yTv0wwcx7kH4+HdXTIdjEJV 5KuvOtldTzxsVuF2GPF24/ZRU6XZWd+u7Pn7io/Gj6Q3JJG2X06wmxA6GAKK1LL2 RaX4C+xDW1zQ6HRs70U3cvLri2szh7FvwsBig/SfJFQcnkUE31UfALoActzHwH0T ToTumh2ZKgigc/fRbzqK8lhSIsfExg6mFoWqgRpZerE3qQsIw+RlmO3WjlQSaFkm DK+GOXToIu3Wu14uoEQX/Tzz1mrjpib2ILrkgA1bNgHGRC3eiU0doL9Q8a48ivrd uuLIBiIH0eLT4rrBqets4xjlxcyYTD0xSCoNp1ot/NtakFUhO12x1KM6z62cdc+B +Mb5Tj1ABczuCfMW1ZSe+4tcA2EDPD2zAz6HahRBUB6p9AdwJllx759PLi5uho6r WjAhnzSegDFM0B/+RCQOSmHyUaGH3LLWi9Ne3jfTkF6MmNBJmKYVbGKcjwP7sF+J MM9SOFxeT1OStzOHgRDui+/nUhf/iwycBhg3Lo5cgUml2sdvZP2OQV3oJxiJrC0E F2/0IJ5Rr3yWXD+a/g77bME9ciRWKrY9uFNhvuPwfgghUOOWW7WYexJBiotKAZr/ rkv1XXWjFIISSLtxZy5qIObFEs8XrpIJqqoIURs0+EGbttM3m1zRlCEfYIFFEcE0 TH64OwB6BlCCPx71yctes4MhpkvqQg== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:812
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3252
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3716

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads