Resubmissions

23-08-2021 11:15

210823-2rget2hake 10

21-06-2021 13:24

210621-12l7pg1cj2 10

Analysis

  • max time kernel
    1610s
  • max time network
    1798s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    23-08-2021 11:15

General

  • Target

    de37078bf2233f7a8de6835a8280d000872d93caeeb58a0904ca36a034df3e54.bin.sample.exe

  • Size

    116KB

  • MD5

    15e5f4633bcb1f5df1c9de32e3cd77b6

  • SHA1

    97f6dc963879eb85aa7e71bdcfa70a27359dd8a0

  • SHA256

    de37078bf2233f7a8de6835a8280d000872d93caeeb58a0904ca36a034df3e54

  • SHA512

    dc5fc1054c9a92f2ce478b30c6ef50c6abd609cc89961d572986f970cb0dee934f9c98ef5a33cc2f42ab6a0f91d1a785737a766021e79cf2b6cd92b6fb68cb18

Malware Config

Extracted

Path

C:\rzsi10105j-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension rzsi10105j. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1E37D4003B58C712 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/1E37D4003B58C712 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ekxdALcPNAVAiE6GeS9zhdbzlJGtYq0QHSECnDsUlU6ss6TCrvuPW53Gf9S+tsyG Mr4QRcj9yQhEis8QUMbWjg1f79c4xyit3YkgUpK3psG9txFwPLYSAlt5PGmUvUHT dN4LQ42L6ZMhwAC2G5u2JqE5tqDU9ii9707ZXLLnwcaO121cBA1M4M7LXCyD8NwH ZUWv6l4D/sP3vLTRUzMnPIzOP5UzP1RrD03pvUCo198YA+NnyvSsoRn8e+aDImOu NR5LENY0TE0PxhbyV5K+sCgodF7K5awvbWlMRhmlDWb3I+4nOss1GUsWJCAYginW TWbSET8ZJdXjPeY+pO3JJJLJdYBpE+S5Q0I6YW03OL4gFjQZtwWCOqieP+xE2yP9 IGVyGI7rAvdQ2715jUKbTihWJggbOlJvNtLBPUWjN0dFiuISsSuaC4peMH/cBh2r W162hzKPdGPh3jF0AQoEhuqho6pnWr6BHTmbkyMyBzunJKJIvxszCFqV+nzceUNU DdDwl84voCM+IzEbnqjbDPplqhjLx4c6JnnGfoWy7clI3TKzxNV0Dh7TCB55SJ2m +s4q4+zCXEIMzC/mIxyAwDa/WM5pQBqnsh4iK7AnMjSQ52k8kCD/BNkq4PsVSjHs Yw8DMVa0vkUd6FjdoEiod1vd3sRXY8w1afIFieShKrKuyfyximYe49i+y2zPq8pb TaZpdbg7T0+Ln9oGDbO/7DSCa6dfaNmr7s7JlpE7ygsAdGtYY6TZ92nstpNNUf3O SZ+lRQWGSsOc9KeVgCkuVeZUbjdleD3UeotW//mNMxP6vHDEEmHMBN9k6Nz0b+Pz DJN+kQOwGbyV9zhmwR6tS7geAImTX5l+PpdKZv5i241PPRbMbgEJ9Jh4sgoQDWoK aATKInpvcsJuSn0oAX/2A9BHm+jS0wIbj4g9jP9scIItwkv+N3lUa+b3Nfb28oZO VHuXDjdjcQKMZunfi5OzaerJGALFAzeeEvH0TO+V4nNKL1um/k04sGpn1NpkQkIB RZFRYZopj8jIecyG7Ti/A+SLVqkHtua47CUK0ZDVOCaUCCKSM32RyJWTkniSeRgl ABaLZ9fAF4TOt84a7nSYduJoeFpsq+Fk1mWrsP3rTsg7oiHbF9Wlj0XdbscfeZ4j H4aLlyhlJt6vTabMzz5i+R5f2OHJMPMFg/3IjgYAg/atpUqiNE4YAZ0rACM+pGqT tFQk1WUJNQS3RHQVXV74eBrbXh+GxklX7PJFAGlB2Xbv2dSPVmKY9n3JN1Vtfvse 1QNj6gw/mhB8uHDPw3+WUlIhE3jbtB0rYzLHW9j6liFvIl21CAAMyw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1E37D4003B58C712

http://decoder.re/1E37D4003B58C712

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de37078bf2233f7a8de6835a8280d000872d93caeeb58a0904ca36a034df3e54.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\de37078bf2233f7a8de6835a8280d000872d93caeeb58a0904ca36a034df3e54.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1096
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:668
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:924

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1096-60-0x00000000752F1000-0x00000000752F3000-memory.dmp
      Filesize

      8KB