Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    19-11-2021 21:38

General

  • Target

    745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe

  • Size

    1.9MB

  • MD5

    6f0f0f10532bcc6abaf04afd99811e4b

  • SHA1

    97f2891294853ccf9693d487f4fe11eea0dcb9d7

  • SHA256

    745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f

  • SHA512

    41a80f301a47e39c5eda4e444418143a8b320c1876970c2d9054c4d2c6f584e944f2a6bf1fd61c9c2a028a746eaa7b85c907a91aabb3a726e3693d96f90e90c2

Malware Config

Extracted

Path

C:\odt\na36cj-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion na36cj. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A6DA3643E50ACB3C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A6DA3643E50ACB3C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: U2AFEOX/cdGH+iZcVpHSA+ZFzTk8XpfzH5XcASXJrbvzQSSr5YBerVEIdVguO0Hf O6mHGi0us5Ttr2tLWH8wZD/OWwEqufdSAP7Ce5JLGr6Y3doWzabcpO92wk1FJpz5 Y4wL7CK3XhpeRYDKaFxrg3okWVJZ/DxUCNZegFzwtpRX8vPwG4LZyRu4sD2TTVB9 Sl/fYR5GUjQe4drJSwFm9MKq5L+2g1T24SH8yFFKLOlIPSdygA5BvB7eC/stY1qN Bv0WyLZ+KASeL0tHdjsoyHNH9yGa+LfGLh7zQUmIYcqtJHbAPc3uPUj45CpM5kZ/ V+vIrBmiw687iWhJDeRx+eDO3ZxP3zeOHGL5BwEYheHgYjTxPLX20zUc0lf+XQz5 0DNMbVPpYGW9mshAhTFKPL3zwEY0ZLI65T0S37BtMmWA/5Sh7UnnHdtnOpV6rgyN PXPFpY7aPAsG8qca3ZUH7MBt+hOyuwNOoUxwL/AFRzN5NzDe6Am8G9N5mrRwpQzq r55w2fhh0iopB7s2JBNzQkCXffEpq8FhDfLa//Z34WStJDRouTFbEoY1M5dBho+u lmd9Xie7Y7GbMSUfVtndIfMUXi40NjIiA5iq6pB9IDEmpbnyQe9ReuOhTrzVD6Ry 2x7A3ke9oH1Tt1uiMQohLTvfcF/SO0nWk226dWSj1oEAVxobUcDwk/aXy5U9Uq5X jLFgUHu2W6I6/vv9l9+90IteRJd/xG4jTwX0hXqnzbt5Y1jb4uw9WmRKPheKWHxB h03cTpyscXeqj9IBERdi9HPaXrabABeOagG1N9xIRjRLhbATUoQKMLPnGeC0JCYG 0gNmcHhwrilsnfCA4kuubJV7548TllC7gXEih6/wqaeSISYNfdCqxJT+weL0/vaf 6atCk232Y1wiSYZ5akhNAaUbmVhs2oE3+X7kHh4m5NrnjvTieMu+MRdJ9oB1Yr9T 6dzEiWGTQFMD7Me4wAaWlGUn0IkPBpR3PsXqF9P3Ko7tAmC604D7E/u3PMTuL8SI OgGtT64qKAjsy059fFmV9blEJVI1/vR3DQEU/Knw2FZ7wXUyeQczqyq/AtubtDA7 yOOc5k8wNbEFsQ== Extension name: na36cj ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A6DA3643E50ACB3C

http://decryptor.top/A6DA3643E50ACB3C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe
    "C:\Users\Admin\AppData\Local\Temp\745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2356
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3348

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1600-118-0x0000000000000000-mapping.dmp
  • memory/2356-119-0x0000000000000000-mapping.dmp