Analysis

  • max time kernel
    33s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-05-2021 16:00

General

  • Target

    4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f.bin.sample.exe

  • Size

    143KB

  • MD5

    fc12ec1b213c77784a3f52f8a4b97a24

  • SHA1

    49d119a9b8ec4ef7cace0259144033358b154bcf

  • SHA256

    4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f

  • SHA512

    a5224870826d5511a919a3070ad1866d74015f40b1d69f4c7944e0551a7a5ab75532ba26cad289f86bdfaf96e3b61f024ab05a953f7afa18bd69c8d68b79de46

Malware Config

Extracted

Path

C:\49o39a-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 49o39a. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] Attention!!! [+] Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1DD90F606EF98E84 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/1DD90F606EF98E84 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 38iv76+wJjc2Wq6lYSynMnzvUXPtVSCUZLINsRV08+79e/yA3O4R2p8ujnbWrX/H x8eL9lChZyKHMbHFEQriH9Ri+RsGbHscjbtTohrOTKQwYIzRSs4IGdyOc19ieFcB uDRoBIyGkjBsYyO2EZDSiI79GYcNYzoQs8RlYuAJWrs2UzHjU8+pXznrj/8HlSmT hBZV4Sx4+E6Qt1JiT2Jeylc3AZGf0CyVIiKRukjdecKuoekFqI4fx8KKZjgaL/RN wnjOT5xzxyLMdALpUKC93vKKhamS+lFAkQmJ2DSD0puyz5xrQuePzX3BApv3Qtwx WYquD3kwTu1GhydKeSr74nE6jFVF8IV82h82K1bjXIu3BYfEQcJlrh1ekq+eIBo4 bR83EFnGGRDtpswsGHYfCVIEO6n32AifC5iAkvq+Yw8XWSgVwMbWGvQ9siXlDi1g oVNV/pI4BJrIhhCSRfm9DVxTZ391r0o6e+A+OAKdA2jY3hKv2dlrrs+6V5PMUKv0 nVXU6tYW05Wrz6fD5KiHREZFrqidiC2AkEdazQdPn2Ieb4Nc44Qd3gJXPQ0kv9AZ ufHqydKtbrFmZXzM+3lwA+uHD09SYS2B/HLSFh/xdPJNoQGo9fTERVQ9zaYm9pT8 3RfKq37uWHo2/gNJlLF3WQGpBBDXj2NpMKZIRg9FdDS4/ujiOqEMxqBUwxH56rXd pC3o1768tnxRmTavfd7lYDa/B0Q3MyAP1c36eOrAX7lF1ZoafjQaT1dN4dkCr2mY h59OysjhkbxaYro1zJxYDaqPY34AIFj0UncXQHEu13ra2AGwM6gceKcQaS53kO4a YqTOOArjrGb/52jned5vWWjxTsIBQSTIJPUjCM4+XpoSXl8gxd+XcPXee2h0yQgs CLHIy4SYkiQJuP8RdPSF/zwETxEN1LnbC2y7skcXIz/kHzfXQ3ckJlmxa6NIOiZO HcmqAADx/+pApZyN6sTf6s/O9DcnmAgzzqcA0MvxMwfUEa5Cw145Q51RucXMo83r qw1XgHRkz/QdklLzVY2tu7Kb+hD6bZ4P6WJcNRT75dL72zBBeJYuc4rlRufZyB9T pfrRhUbJoui0npV+gDDdj1t9Vewk7XllazSS0J7YVO4lV18opbgcX7O0oaUMjeRZ OoE36rLBxJe2ojnqyXqOtjY7a71wPvA7LkWvyJoAz7u/cHjpRsgY3U7VVD+amv0m 9iNylLgKxlr+sECmKuYJbGnQzhcsn/2DAsMniotQfiN5OCu50bSAM4CZU+cXwe11 WsALD5qS ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1DD90F606EF98E84

http://decoder.re/1DD90F606EF98E84

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\4f6ce92fccafa6d2454a12022e21fbd6adf1a6ec2d45c71de6f8729ec3ad195f.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:784
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:204
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3236

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads