Resubmissions

23-08-2021 11:16

210823-ggqp6v668n 10

26-07-2021 13:00

210726-tcqvqnjtlx 10

Analysis

  • max time kernel
    1784s
  • max time network
    1796s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-08-2021 11:16

General

  • Target

    2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe

  • Size

    157KB

  • MD5

    6be0f4220e001e482cd0323d2908832d

  • SHA1

    78194af69506ece5ef37500ff38cdcab09167065

  • SHA256

    2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8

  • SHA512

    d3c01cfdcb1d97f3a85d84356a4ad2015085f8293dc8cbc42e9d636f36ff486e2f16634c1bacbe203f5a77a3f4721c204e8fc44a94b9e8496df711918dcf29bf

Malware Config

Extracted

Path

C:\odt\x3nd484s-readme.txt

Family

sodinokibi

Ransom Note
Hello dear friend! Your files are encrypted, and, as result you can't use it. You must visit our page to get instructions about decryption process. All encrypted files have got x3nd484s extension. Instructions into the TOR network ----------------------------- Install TOR browser from https://torproject.org/ Visit the following link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/614F6CD6972849CC Instructions into WWW (The following link can not be in work state, if true, use TOR above): ----------------------------- Visit the following link: http://decryptor.top/614F6CD6972849CC Page will ask you for the key, here it is: JsINEVOFXM7FzdRsZd0CyB6KgnwNxhceaqhK8EXhFV4Zc1rlZ0HZ2W1ewvvnmimI iQL/4By3kp624A9VGGT9ZOqRhPRPiGp3I2kLPBsoauH3nQ4GrptugYh0cuvGRw+S XbtLLnaaBP8+ZA3PwVDlAhPz11Pgm6TQBtZrFLVXOClmvnsCZXCqWwBqO2CTRGnW cTkOJi1qJsh2omlgilUsgJRBn9KI+zZse4hfwBhy28aLlGneKSaqcivLd92pbC12 rro9YeWxLyJYFgvWkfDzQMjmQmtsM/WOBPIy2PwwEfmtFc5+GsKtJIOPMYf0DUPa ov5ewuz41lKXqUsh7nyLTro5+hIy2mL571lQ69OISwL9cpmQlg9eMM/nffyb3VcX 4ctOWFIDZz82liZVmmGgh5z2dLRO5d9muUhB/RdZG8JlZeWWGeUpMFgnVhZnfnwv X7cXd6A0i5u7D/YR2A4PY6wkEbmiNroayUbU4nHHyEbQ4stuyx06M/sohTLOEHvH /WBVBqDm4FxrKJMPu9WOs8YElLue3BHWvXcJRsOSVcuXOPq+mc9QXIWPirJJYC5t 4IpOXeIzE+xmieB/qTzWktrXOYeKzlJZRk6yHD9w8coAHQvoBytP8p8FmLXQlyp0 IoHZSdJcNZuVSr4n8yfvNlO5MPFioE/bIbGmqBga5nYcOtel+wLqmhdU4BuSeFSu N92c29Ok1PSfHO/BekRyR/zqDa66pLK33J+xzd26mPpiVEDHxDHsuOAMKTFw8o9r vF1uDOrHIQgBI5+s+O/RGPQjl2qeK2+anvbf4yNPpPYvBhqPdphF/NZchMrTTNEt oEv/ZSzwSWLFfeYSzcFPeKO9tKnIkLEmJv/zkJDtTxSjPEt9yPwQ9mxedz+Fkg+C FBEfSLyC+6bnqOVegx6fMU2G5dznTgNAq3WjS84qZdNwdJopIAuOFkrhgDcC9c2t RJOunlegVsMgGYBULo0rsLJGtFass39TJv27TNPTVXyeoX3w4cL4qKmIybiZnCmy e3ka0PvP4ubWIU3h+n91WBEvNXeLarnfI39fCeG0AYOPAtEb818T/elFKBB2OBnG /I5Qgqeg36k=
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/614F6CD6972849CC

http://decryptor.top/614F6CD6972849CC

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc2dda39d7c8d859a69ccbaaaf40d2d6495006696cdd50f13306398f82044b8.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1596
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-120-0x0000000000000000-mapping.dmp
  • memory/2992-119-0x0000000000000000-mapping.dmp
  • memory/3936-115-0x0000000000430000-0x000000000057A000-memory.dmp
    Filesize

    1.3MB

  • memory/3936-114-0x0000000000430000-0x000000000057A000-memory.dmp
    Filesize

    1.3MB

  • memory/3936-116-0x0000000000590000-0x0000000000591000-memory.dmp
    Filesize

    4KB

  • memory/3936-117-0x00000000005A0000-0x00000000005A1000-memory.dmp
    Filesize

    4KB

  • memory/3936-118-0x0000000000640000-0x0000000000646000-memory.dmp
    Filesize

    24KB