Resubmissions

23-08-2021 11:12

210823-681sdqb6fx 10

29-06-2021 23:44

210629-4zlddtzv5e 10

Analysis

  • max time kernel
    1802s
  • max time network
    1808s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    23-08-2021 11:12

General

  • Target

    fd164c4c121371f94cfd3a034ad8cf8edc7c0f7141a8f4c9da1683d41b212a87.exe

  • Size

    122KB

  • MD5

    fc9edc350d7ffdcb9e53390dae26ea5a

  • SHA1

    06b1f63eb58202a630cfab82c608111a53177db3

  • SHA256

    fd164c4c121371f94cfd3a034ad8cf8edc7c0f7141a8f4c9da1683d41b212a87

  • SHA512

    84b377ea7f5b066b26f2ba60d3b9dc7fbb088d2f0cca16716bc99fc7bfcdd6f1451bcf3b134b925c090f291bb97fdc5f589dd645795e4d1e5c124a316756c86a

Malware Config

Extracted

Path

C:\60lzy13l-readme.txt

Ransom Note
---=== Welcome. Again. ===--- We strongly encourage You to pay your attention to this message and read it to the end. All Your files are encrypted, and currently unavailable, now all files on your system has extension 60lzy13l Before that, all of your most important personal and business files were backed up to our secure offline storage. We took them for temporary storage - but we don't need your files and we are not personally interested in your business. Our encryption algorithm is the most technically difficult and max resistant to burglary. Only OUR specialists can decrypted your files without loss(!) Any attempts to decrypt files on your own lead to damage them beyond repair(!) Best way to you will be consent to negotiations and mutual agreement between us. To connect us you need to download TOR browser and follow the link to begin negotiations.(You can find full instructions below.) We are waiting You and ready to listen all your offers and discuss them. If You will ignore this letter - we will have to sell closed auction all yours private files, photoes, business correspondence, documents and business files + with our analysis of your work activity (weakness of your business, financial violations and the opportunity to profit from this information). It will offset our financial losses. Or we'll just put all your files in the public domain, where everyone can download and use them as they wish. * For TOR Browser http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ We are known as "Sodinokibi (REvil) Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread You have a guarantee that your files will be returned 100 %. And remember, this is only business, nothing personal.. We have a concept of business honor, and we can promise something if we come to a mutual agreement: 1. We guarantee to decrypt all your files in the shortest possible time 2. We will delete all your files and forget about your company. 3. We will show your weaknesses in your networks. .-= INSTRUCTIONS TO CONNECT =-. How to get access on website? You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9E49B77C3E305A09 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/9E49B77C3E305A09 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: FfxZj5MLKyll3V4aXzBh+lEj7Zrp2n9Z4WS1CmW4v35Zu8+0rwLO+etCjYtdsU4p JVJXnX5nV7PZKZVelSyWEhgzM8e2GG9w1n069B5d16ev63YOBbDnslsBMVsEZI3M VHNLIz5grL3sqOyzQDRcLziqGF7uTU/44QNcwA7lI1iRsLmEbrn4RBgCWquXsxXz odJr7iEZayY21SMjUJJqvjY/nCVZ6KUrMh6GQT3AboLa6eoTaoViOPIiPJlig2WX frnUnr86l0CX5u51iWjHoUj8NF25+brBXy/r6Z7e7sgzUwfQiWoXJp4HF8UotSYC EBbKML6rFDBBgi9z0wTt/enClHN5DAWXWSFuxOw4AbhNUQIyJXo+HW3HbFJl1akD aYwgyu5KWcGijxUIhBGQCQNWDLQKmvuJkUyX0rEm1aLpef13foL0QS7PtW3mNyT/ ZVnu7QSphrpfPrkfDDuYVPBSzdJjbBnVjN+/5+ukW0f8XbPviWPa8jzsm4CX0tkK r47Er4H05ORvwpuSkZwjhyFFeL6NpOYzzcYu9ARxB6YrnKLolzzKzURXn9cO0wG9 3xgGy2K1EtExSlYtC2W6RiTMfve3mXGwZihSSMdbJ7KHhSH2exf9GbJ2BR3aaFL0 3a+KmgfjbQqezIjoHLGFCkSJ8GE2bUjhdNMncZvEVGNvR2Vt8LwK0URnsBlOzfPR gRquH+zh5arH6Gs7u2bTEq6XbAcQytDCydwA7n45BOFERnWgRjN4EEl84h3kpRjA ik22Rm6bl2QXP8KebtBBU1ijdc7PHP+jLXDxP5prI1X0+0gUtZQrDntXjZ0fZdBl dAqIIOCLh5HgM+cspHreLyD2BjpArdixx05ywtFEekjRNKW8mIcvS4akRaS4p1X9 WxpTzLlExbIh8/TKdwkhV1v6PkUYY511dEpxS9EIT0vtCaNYI+Vizl/OVFOZl2qE aoKRF7JCh8KVFJ4OYlny/N+9Rs1uXbcWa4T5N6Lwl+xQPto2Z5x97zPD2Fpq0rpW kjRQMuNv4UxPHcLCm/kjwiLkQxfcU7TCyw74c+tw5NYecFyDuzFupMmHHRrbf+Zd H4jn6tn23mv+yBCsLlRUkWEEUSlSUh7RypMMHtvYE6KRfxV0Pwt2RGfdZ9HZyZrr Zh1sakJAnrJ5KC4jr7Krod8tJYJb6gpNJHAGAlO3VCvE/d7KRVzOIKcQFh7WpE8L hIoTtkgyXm2eB9jXvW+BPAfw7TaFUvK8VT4N75bFebtWAa8HKgVH4mU/n+A7y+oS 8sk8uXrH8KSh7A== ---------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all your data!
URLs

http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9E49B77C3E305A09

http://decoder.re/9E49B77C3E305A09

Signatures

  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd164c4c121371f94cfd3a034ad8cf8edc7c0f7141a8f4c9da1683d41b212a87.exe
    "C:\Users\Admin\AppData\Local\Temp\fd164c4c121371f94cfd3a034ad8cf8edc7c0f7141a8f4c9da1683d41b212a87.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
        PID:3280
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:2664
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:208

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3280-114-0x0000000000000000-mapping.dmp