Resubmissions

23-08-2021 11:16

210823-ggqp6v668n 10

26-07-2021 13:00

210726-tcqvqnjtlx 10

Analysis

  • max time kernel
    1717s
  • max time network
    1849s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    23-08-2021 11:16

General

  • Target

    2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe

  • Size

    157KB

  • MD5

    6be0f4220e001e482cd0323d2908832d

  • SHA1

    78194af69506ece5ef37500ff38cdcab09167065

  • SHA256

    2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8

  • SHA512

    d3c01cfdcb1d97f3a85d84356a4ad2015085f8293dc8cbc42e9d636f36ff486e2f16634c1bacbe203f5a77a3f4721c204e8fc44a94b9e8496df711918dcf29bf

Malware Config

Extracted

Path

C:\Recovery\4175k-readme.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got 4175k extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F9198412CCE757A8 Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/F9198412CCE757A8 Page will ask you for the key, here it is: zgULYyadXxt0UJcPNO+N1EsGsrMgJz78aKUdDLYKgimQc2DuURkwkc6TEQK3kziR wecfiTFRWqkzop+gKQvzTjG2sIkHSI/zKOZKVVaft2rh9wGQq7dxNwdp7qA349W3 j+gmDubOTnynol2xbrTvlTfFA1wcxvGmX5s0/vlU317PezUWWDU9qX71crrwCUt0 o8bZFAGUjS/pb5guZw24wiMYoj5C7FpjlXqvECeDpHOf1qABnM4JclqwXvEXh4hl UlgbNVWL8sim9hoVoaqpZK4/w93NVQZYILytgCdu56cp4U7S2cbGAbxm3VJFdid6 EFoEsSv99/WxJ2LwXArbj+p4NLnoS3M80Dc4LhryBPI0yR2VbCZouzDnUrUD6XYR c+PKX80UWnKdqEOvzXR+AW6dIRa1aQGqWhIx3a9f8pz1vEDoDHSI3DQWQThz3hiu /b6N3Oz/cWPYdXI3YCG+PP3PgxrBRcmk4FL/ymqr0eKP3mOG6gr26Xc8RaR3SYka 7N99UqJnSczLtn+CohKTHouFhMdL80rfagJ/dJnp8NHR7TZ0rymxW02DP0JyTlwm YuuDCU6DY3T4L9ss61IwlvkT5YHqGN+2tWZLqyAmubSgmi/DHNSo7sDMtzYO1kft Tk1mQaC5TN4P8/njW61O6lHMkUw6uqWmja/joebjk6LD9M/EEEjoBziURZV4zBz/ 1uJmhNvJ5IJ8y9PuhrluVBwwPmPTt0BMh8wmePjkqtV3dW/02ewdwYRmDVx4flaE KCRwCx2nd6GOZ2SKUb2IUiAC8taffe4j6Yj06lh9dyO00tRUQW/991pxwWL7eXvI R979Fs5AbsdGe1YNp9CLg3WK4qwMzaBoudjmZNmHKl53U4a8Z7T4Z5jZXovDzSAg fwAMs7xB0aWnp5C3xksE+g79ht4V5UIizTrjul+W9kIF7LtqDuznfnkPDICDsp+S 21dsf0CrYgcMR5d5TIDfpC5ZYqsY0CiBLsdMuIb4fAlI/SoN2agNXAsqer+mR8De vd2XECA4Vu7wX8+/sw20TaSZkPfH51OqLs7WYCjdSI3QvzUjhfgtMBRxxU+lwr+m chpoPRWDjaNdH/ByLniI19joELwS04uj
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F9198412CCE757A8

http://decryptor.top/F9198412CCE757A8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1628
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1476-71-0x0000000000000000-mapping.dmp
  • memory/1628-72-0x0000000000000000-mapping.dmp
  • memory/1984-60-0x0000000075AD1000-0x0000000075AD3000-memory.dmp
    Filesize

    8KB

  • memory/1984-62-0x0000000002190000-0x000000000222F000-memory.dmp
    Filesize

    636KB

  • memory/1984-63-0x0000000002230000-0x000000000235D000-memory.dmp
    Filesize

    1.2MB

  • memory/1984-64-0x0000000000350000-0x000000000036F000-memory.dmp
    Filesize

    124KB

  • memory/1984-65-0x0000000002670000-0x0000000002779000-memory.dmp
    Filesize

    1.0MB

  • memory/1984-67-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/1984-66-0x0000000000220000-0x000000000022A000-memory.dmp
    Filesize

    40KB

  • memory/1984-68-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1984-70-0x00000000002A0000-0x00000000002A6000-memory.dmp
    Filesize

    24KB

  • memory/1984-69-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB