Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28-06-2021 09:31

General

  • Target

    5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25.bin.sample.exe

  • Size

    122KB

  • MD5

    8332af66ca738dbb08789674932aad81

  • SHA1

    808968a7f54fb83865a76328630d8d33185de1ad

  • SHA256

    5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25

  • SHA512

    2f7a3dce41b52459d1da86e68f3dfa867858c02ed918d43d5642f370c43ddca9c5aa7119e1aab8677b12e530664478d28ad111c47f2d4ca21f65f48f62f401d3

Malware Config

Extracted

Path

C:\dy9bl-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension dy9bl. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4DFBD58F02891384 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/4DFBD58F02891384 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: xKlkDOH490sp3eKOKeoBpWMdZShf6RRobOppZ18F8G41lXvSm0yQoTzbrm7rmULs Xlv6fRevwANf0BD44nflYMQeHqX2kxA3mWDbyyI+SAI8NAyclQLuHeZ+IvTWTFg4 qI7R0ADknlbAHpvtg4+dqYKuCntyU4w6OIwS9KlGueNSHH/lCMlm4EsVEa6qHOGR OWSPGDlfBOQvEN9wTxXLrvIQmQIn5VBrx11lFZ+ElZo3cQRfEz0JQHnerUhFD1p9 mjvVays3XT244vS5mrc9iIyCZgvtTiHv5bLrCM++JhaBu/DbOq6Tyr5brxeV7VMn 1QbnnhF9f0I7eWXK97TwpbwXvoIRl4zT1WLds6HJdISYRq32AwMZQ+LHEFBmIhdN kDpiXkWwwysKKGbRrSBSjEYrQDahECPEJRPz2RdVRTGZMyMp1R+1FZZV7W09l/yE c83RMziA18D8Lq0x5DF/SqQFFRvhtCIHNSkXDJfunDLEmQoYJ4fw0hpXhlo+UC+A 0A7V2OPYRnFKMTuknmB4fnfGLjHo+iEkODuyUyDqsTeOfBLmkAbPJBmE7b+PBIiW oYROhXZk6IFkJ2P4gjVZtpdI6qbTzH5TpgOxz33U9V2k+2xMvBzKKhxDb6fW381a 741CdZ0FvvuTOrLWY8TK5FYY2WxHwn9tiED4YlrWfSt1Lnxavz49+xKlI2xMqmdv acBP5NXtrK1XjVCDq35Izqoil/18oBN+8tjFDNJbYgGmrxo1HONGNwGjLah6Y1r+ hkNrn5TvC4xQTyfjazXEPbzxabhtI+2Pfnxuifn1u0f8cyCePbnQzvCAKkjVJ8Il Pem60HZVXoQcuBxROtY3E7nB5jNzckZH7hc+taLkB6p0bQqKe5cUUBZCoR9xWww5 0V+HWbIgC4tMylbu/2ChicFhlTDBPV+FJ4DiAEn0vEpvxM8GtogriDVKBpNPJZUX HkGMFhZfHr0T9ZYVnIgUqnIQ9u/B8W6KS95b9tQbXiOT4AtDVijHygFe2dvFAVvC IBTklJuSxU3wbwS+0T6jlQ6q6L4itVLJ53c7mBfudDIpbplnHoI+e7pjkNFFcRL9 uF9Rvaw/JsopsLUJrf3h+3uHMMgOsH5GCOZAWumf74hmTtI05HZQyZcQO04AxMI/ eYQyBre5XU7h5FfHux7eJ2XzmE71ZdAVYsAPKxN94GAsdoIJmYEBoPvDjaDF4dCY ITJdrPsqw4Oh60gUZXkf4PsFMlWxKHVEd9vSj4aWtDK/4pXm0dhTEDngffdHOMxU wqB2Gw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4DFBD58F02891384

http://decoder.re/4DFBD58F02891384

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\5cc28cafd16e1e1405e49644154f63bc554e862dda22edab2552345e9d4a7e25.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
        PID:3704
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:3500
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3776

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3704-114-0x0000000000000000-mapping.dmp