Resubmissions

14-09-2021 08:49

210914-krgqssfdd9 10

13-09-2021 13:07

210913-qcw5tsggfk 10

Analysis

  • max time kernel
    1802s
  • max time network
    1799s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    14-09-2021 08:49

General

  • Target

    21eb941fd24bc9c0edf92a82b351ad8643c8291ab95b03c12735e1c5c06261a3.bin.sample.exe

  • Size

    165KB

  • MD5

    fad3cd9094f43e48c8e5061aeb2d76ed

  • SHA1

    cdeb9d27b479ecd25e0ebcda4cfdcff8b969470b

  • SHA256

    21eb941fd24bc9c0edf92a82b351ad8643c8291ab95b03c12735e1c5c06261a3

  • SHA512

    9063789eab4ea880199791d5f66196b513bdb206991e22e7a991dbc47ffb0aa837e1452de7440985adb7f35e38b6ab7d15ebfce64e1ac2e2c91545876326e015

Malware Config

Extracted

Path

C:\vop1j504_Wannadie.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension vop1j504. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A22888B8FBEFBD28 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A22888B8FBEFBD28 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NDU+1O1CvzDkrNyjdqeJHJFrMS0jzAQZWWB+2OprqIcXX4V6CBgIGpfatym9f7Eh Sjy75OaW0s72gcEjiUVH+woWewArvOspiUs9VSlrgiTvkAw9gRRVrps56+A2C2Za dfEw3MCzqnPSEn8tuc7ORI/0YUIp2TIAs0o3Aov2COnNCgSzYQeEi10oWSZmDgwG 2sFlOxJwCkszmSRdlk4LapfdS/awKEehTLZuTUp9wN7+G85Y3691T+46P5VwFcMl yzkekcqPGddY1e5//CZ4K1KYfhmcAVZYWtzicWXObbCsRREZGgVM3/1AbzyK04aV fYtHCtid3UwiMQyj8olhSi3dVARD05gGLdf7fjs+T4WdILR8ciSwoaOR8vP5AiBq /J4GSC6rbREjdsmet4LbfIZMjMKxrLkmSNt2aXhTQ2JPymlsMcMyicwGsdsE5Bre bn9ywYe9EDxZl3PKCkM3QUZ7w+Y/AgOTgv+lDj35btQsf5KCTVFZITd7rq5L8CB5 yfEjac66V1FbPtPQsPLvUPAWkYO0TioZPRNC2mueuAnqzwWS9ZNpfN2G5xSSekCp tPAFUl3AWPLjGdzOr2ft1aXgW8OEbL/CNr47JFw8J0CLtN4f9PctiGnnFz/7fdyF keK5SlGeKYnBuWaeV1XGlD8B6yc7iMkaft2r+c0BMV6orKf9xN2HJsj97cyfwrHD RiODYFtwwHr2YfwXhKYK+1+sO8gw8BsGHst6qC4TP/bejcJM6/YkEHVLDfzpO8qU HefRFh3J9JhKT0elni6rwqHQPQPJ869eLp2cLRHsJ8HTiiDyeZxAlUsP27L5ugsV MQ0xH6yqfun3H2OzQzhMqiNI7gzJVoowdy6u9TeTxJNb3PtkpHUYvckujE9Qrqg8 FK+RwGdKMD2kvRQVXHTXailEPlz/Q+bedMdHsRxRKovSc4UTIxzjFz1A8P9U2wER INlOQYhVkAOQKf4rziPH3C9nhpmWmsJvWPj4CURIXY6xJPpp1jHh6NIOA9LRQVX0 DwqddwOxDQ5O5unlD5DsWzTHMIB+FyLO+jHypJ+NoOYUrQE/JxYY7dDuwqZQD7ga Leh7XECbZo/wmnk6mLUbGj7y1uenrw8X3ujSDLlQ3stqeg4isKet9y4wo1qxpKUj Extension name: vop1j504 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A22888B8FBEFBD28

http://decryptor.top/A22888B8FBEFBD28

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies system certificate store 2 TTPs 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21eb941fd24bc9c0edf92a82b351ad8643c8291ab95b03c12735e1c5c06261a3.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\21eb941fd24bc9c0edf92a82b351ad8643c8291ab95b03c12735e1c5c06261a3.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4520
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4536
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4760

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4520-115-0x0000000000000000-mapping.dmp
    • memory/4520-120-0x000002AF47770000-0x000002AF47771000-memory.dmp
      Filesize

      4KB

    • memory/4520-123-0x000002AF47920000-0x000002AF47921000-memory.dmp
      Filesize

      4KB

    • memory/4520-125-0x000002AF47633000-0x000002AF47635000-memory.dmp
      Filesize

      8KB

    • memory/4520-124-0x000002AF47630000-0x000002AF47632000-memory.dmp
      Filesize

      8KB

    • memory/4520-135-0x000002AF47636000-0x000002AF47638000-memory.dmp
      Filesize

      8KB