Resubmissions

06-07-2021 11:37

210706-77ldcs8prn 10

05-07-2021 14:03

210705-kgqynjz7f6 10

05-07-2021 12:34

210705-5cj5sav6qx 10

Analysis

  • max time kernel
    599s
  • max time network
    602s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-07-2021 14:03

General

  • Target

    66060484cccedb839fb646d4e6020e079319374b2847c52dcec55c5ad60b1beb.exe

  • Size

    120KB

  • MD5

    ee11b17a14f1b7a6b197e9f38eb5cf7c

  • SHA1

    7fd96ccbccac8731cc8157100740e850facebcc6

  • SHA256

    66060484cccedb839fb646d4e6020e079319374b2847c52dcec55c5ad60b1beb

  • SHA512

    2ae1a8adcd52cc10235d0ae1fcf018d04b6675b951c06c67d61720815c437c9c6b40663da1fab9e8c5390b92798b4dfc65821b27a86121bd4dbdf05230fdc227

Malware Config

Extracted

Path

C:\5r8k6r25b7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 5r8k6r25b7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3A439B173385382 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/F3A439B173385382 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: fS5oLV/wxKQRFg3ENDC/Fo0GAjMoWIuTlekrG2xSP83rSoejek47QAw4U1z5L+nO Hcnw1gzOBjXNmcQtwTRtl7BXTUzCcFn4i6XoEOnpDVcXBqlXnQgRhNWlDoSHfDq0 szZMKzvFvJsIS091oWEdmNUPBiRidHAI8NTMbtfPTMbe2IP756i0bk2VNkrHESKw wGLrFiPXVdkhivZ32UOb0s3/L/hkScmJsU3fuqM6FcY9XH9PXhoWYVlOjXyrAbo+ IwSi/gHfyDHzqLB5P5qG8ijhE4682E8HuHEPBQU/ztbZAeM7b5HDeQo8uMeQEuq/ Md3YSZMDy6aD+aPZnZFMq2XUmL74y9unrPWf0aSSoin+MrU703CJJxtDmFq5ziDw 5Fq1hCSqx4Us+qzTXXqy1NTkAu+tfSX0IzzcJoz973j31gqiUgUVGYTiW1tz74bs WoXYcV2AueQMKGxJxdgl2NdGPCoIe13lBXke70xPNEuVjghECufr/lNy4l/ak2pQ iFXEeLDkkNVv5+Rmymvd8pqxhpUaOGvlnrjuPtvruDu0V7E2qs3mzSMAJWt8rGGf CxRkH3FwIPPpB4v4eD5I6Vj+ma8r073e7TJ2XVQ1p9aL+0Nh2kiEbK75RpofP6h9 HnCy5987b3Wkbkc3JjcpxK4DzucHXN9cw9x2zvYDZW3w70Kf1IDdbdANHL14dEjS O4W2N3jNkm3YUhwB/33Fw01VrM5LpEkjWc+lGJvXBRHk+9Ksw4zaM85/utcdGzn6 1iSziLFvPJvj5Ohn14eXhTLAK1NPHPe6gfTfFqpIRcJT/HOand9ZbiYm4gvJ/Ihe 94x6FZvGomxlr0I9ytvwjj9e3Ru05gf1Mpi7fKbjB9AUTa85lbbG1Kv818dLvoq7 WCief/URzU92bgrnyU2kliFJyq0D2pibVram5TAIjSkmqy8G+eh6nj0U4i9sHasU jLgPpG7p1wIcxw4UlKbT0MoFVy0J4FAOWIemSBl4nVaLc/L+dF1x5cEDMYRnkxT6 E6ZkUoLqjjDIfCtv0h17vS0ikKnw9XVH2ue6YjC3R0fFgany5GHvOTrrjLuccsV3 QI8najGBeiySJxQlSzfuMzlGeIpf18pfbN3XgsC3aLwUDKiyEbF9JAjcYwLkS3iJ e9D8jg85ezIO6a6D19YopU1KOFSwl3spukTnUwCTIgNESUBUsDCS9t6TrVoyv7bs ExoUM98R66oRp0Hx46fxiJzoSlQ5RGprrG6r7v9c+6qXtlMXkcmySjAA17nGkcfd UlNnl0leYL4dQJtgcAQ= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3A439B173385382

http://decoder.re/F3A439B173385382

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66060484cccedb839fb646d4e6020e079319374b2847c52dcec55c5ad60b1beb.exe
    "C:\Users\Admin\AppData\Local\Temp\66060484cccedb839fb646d4e6020e079319374b2847c52dcec55c5ad60b1beb.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4056
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:776
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:736

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads