Resubmissions

30-03-2021 16:17

210330-fpaktx46ax 10

19-03-2021 21:19

210319-m2gfgpqkt6 10

Analysis

  • max time kernel
    142s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-03-2021 21:19

General

  • Target

    939f58c10211a768f664a8f54310dcc42eb672887be61d5d377b5a88be107b9d.exe

  • Size

    120KB

  • MD5

    9a24b3de7af3b2a2f1917e72e64da268

  • SHA1

    783bebb04eda5a88851aa741133ae49c29f44415

  • SHA256

    939f58c10211a768f664a8f54310dcc42eb672887be61d5d377b5a88be107b9d

  • SHA512

    631b8165326463749e8bb01e74304343158b4cd4c6c4e4a8e60922a298b90dab9c83c60fd69c4eda8ddf2dcf97c4040dc723f7e9beeb9a94aee568c30867044d

Malware Config

Extracted

Path

C:\8cyi46e7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8cyi46e7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C2168476ACE0D8B1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/C2168476ACE0D8B1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 8kEZ6CmgEF6PmN95aTrwJVY7kZqUooQrgttvHGN4EhBm33NcuDFWipEr1BL9e1XA MN9forOqQqkz/DK/1srvuHCpkG2XdWrRVBXolKKSYjImKTOKd/9nWJJZEzms/V3f ESxOhdp+7bSIE+jZJFiy1exb397WtAUaRMY6M8c8h7rtjAQxUPHEGe4X53+zZrmA UJA21F6s2h8R+smd0mHUDJoNuSKSYA8F09od8vpSQpOQVqcepyfLdcodI8ogdK90 k0kZbzYX6YuiIUWS0JvJY/y/YSJc+N2/lbsMSQSAg8llAkqSEbB7JNQ7OvTHuGNt UNDNYHi5YDFhqF60sXFsaOx1ZfB+nO9xFGZNrSjI7SdfilGILtRKP2ftL8I+6I5R K/NBNXGI/zSBuOI3p+d9yniW9t7BVbOU9tIwVWKVXkc8xqEw94Gg0v57nuKckgQo wCVhSHSD0HsRv9MGmTOnqZ69kW4paFm5NbmkvIepkD+vjwKOJIiF7P/RcgfORAn8 DAXaUf2qcRhpgMkLNHmNJUnWdZ0ShIh9cSLN59zLW26/80EREtXMYQur10URfsuI Jk/0R4WljGO2uGQAMlTjQy7oi4foe6D9P5mkNbSBx2kY0SIDzPQfRKmfmYJhgjDM tpFgMa3vqm2yqI0Dhm3i50t8kAAwoJwibsip1BmiaC/9335tNMM/LLwTNz7YEwYX vpGTKiOB/b/7TpyyRZtHFr+FjijipxO/4RXDM1j/5j6bZJ8Upex3loJSVZB4eQCd Gw9nFsfL1QTq9Pyu/97ttv59KZFgsASwxBAjZLF3lXzQLN5nket7YtknxUd9GmMC kUj1aah6zhtEBbWyiTcyKF2a7SY/ar1a7Y3r8jRq9P9oXjbA1Mqg7Js2Vg4OEJL2 mBr5CI287NzrBe6vWnI82AyNgc4wFf+qZeYPIg+Us0OhMCS9soY5WSMwINMERVjo 82QBEURjxA7BxmMLASLUpgJNjEFS5NVExDCKsATBqjAHMAbY6yXpPO9HdoA4GyF4 bqfLyRZfkrZkpkeg1nWQ44AlngQnqzSLAgnnJOZNoYP46RA3MWJ0VnpZX19v9O1v +QBvjee9IHf6AqGNBVG3aZSfGad0lKbgrR+gudwmukgBgkaMn4LFVBxZXBtxYRNQ fXB3IBdDGqr9SxUCkH4uAXJubGwugBDvfwvi8J0mAVY88/qiGRIYs/xCat3eqA2N 3cP33aKZuiJKn4eey9XN4JOPAfIQnIrGe1k/YpQFMRrYjFwEQlwn6qszGQyP9Ouv Lh/uk+PeRhFVlA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C2168476ACE0D8B1

http://decoder.re/C2168476ACE0D8B1

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\939f58c10211a768f664a8f54310dcc42eb672887be61d5d377b5a88be107b9d.exe
    "C:\Users\Admin\AppData\Local\Temp\939f58c10211a768f664a8f54310dcc42eb672887be61d5d377b5a88be107b9d.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3888
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2920
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2760

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads