Analysis

  • max time kernel
    4265550s
  • max time network
    604s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    15-01-2022 12:31

General

  • Target

    enc.exe

  • Size

    161KB

  • MD5

    2c448be318e53757eeb78e1a1ec2245a

  • SHA1

    072d3c8b6bb946acfe17656071faec4bac7c8b46

  • SHA256

    c5b521000c1d318921b58f7b5db3a067d28e6badd304ea9085831af8985b9fec

  • SHA512

    bf6614f3ac3556b3d049bc4192e49680025758174bb2c0873fe5967f8bc3e29f82ae2046876f1502c3db7adf51775ff7b2c34ad9c9cdea4e7a16d23f6f4e7f91

Score
10/10

Malware Config

Extracted

Path

C:\1liu3-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 1liu3. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BDE0D235131B359A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/BDE0D235131B359A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: C8yqyzSAXiZHPOa0VqZaDa6dEU6xVMtYnsWUmJgHQ94Uz7ET0u7n1uGysBlyvOti dVq1T3AoFMe9AwGwO6zBYzsgl71HfxjpVzSIO2if1yQD/DveINwBXK7FA/ofyY+w 5yYfMW3g7PreroddHWXsy9EOJtMN3XvIGzFjs4KSSpxg7UnqO+p/lene+5Mjr7L0 kKZilqzm68U5RH8NoolD3wfZS0+uMz9NlAZe9cpAbvlrQErgTbeaET+KwAdM7erF h7FycoPGZcTqWfE9VPQV4y+RjG4Vj6YYl4EFGoMXGl9E3g1WfKmn6HB+K9HTQI5D VEtpPhTNMgQJDEhIrnB0gPeE27HfDOQovQN5RpZwW6I1m4pYwZOQpDSPuujLV0/6 uBHCmETDVQLj4o/7/OYlWv8QStZuNSaI4ahC4ydnhhQ4KxI+Yib7D+5ONDaPYgGM VO9Y2HyI9Dl55Ovqzoxo80lHE0ub7HCG98lHuf2nM0bbQKRAB6Xlvk3y4Pn10F8B 8zQ8adb85CROO19LHdHZamwcIHx1T7R8JAnbgvK4jpn7R15ZlW9qmQ4f3U8xvj/q CanOEAB1s4JgvtdYtI5eRRZUBzSjTLjDTW8tlMe91BcHtYXUbaIxgoiVkxvdCwpk 1TifjZtWN47JykrUz7e28Qdkn8RfOmID+EYTgFWNpMkohqEir2AA3bwno3/pR8jj tp3k3PL8Xt8GszejcYDcU9VD8rA+tohwuStf3WzRZlkZ/9GREboMsujGezlZ5SOc Bdd73fD3YM09amP9HDG0MAUOVwf2jlOU3Qf0HQPkov0tc74YEyahYKU/SeQMGNEx i3jxV3xYbamc4ygdHqSRjcjTomlxc9vfM4LlrG4ZzZsLTLbWBVi2/ProSlcRMJkL DPX8WjsVPzyODAa+nSgAlGhenThUoYzuv25sX4tc9LRXsFZ2GkoS77+j4TAcDM2x ilIP8NoXtQPEmrUoJaCrFvUDSDphT7tLhg21pEsIsHmraPuy/KKAZjc/2F7Xe5In yN+TVY9HA13rWSq07n0ZR969CvTugA+i3HGEZdnWovzyD4xhKRZ99Om2IYb0TmM2 KvdXLTYjgNq39MNQgo9qTcuxO0HTOcF0s4srCzyX1y9lAQu/Xm9vmD37W6mAjHwr qC3RfAuV Extension name: 1liu3 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BDE0D235131B359A

http://decryptor.top/BDE0D235131B359A

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\enc.exe
    "C:\Users\Admin\AppData\Local\Temp\enc.exe"
    1⤵
    • Modifies extensions of user files
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
        PID:3600
    • C:\Windows\system32\MusNotification.exe
      C:\Windows\system32\MusNotification.exe
      1⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3992

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\programdata\usoshared\logs\system\NotificationUxBroker.92a23dc2-8cba-43bd-be0f-43f3acbde06f.1.etl
      MD5

      d395b91373b438ea1b581ae07ee7deaf

      SHA1

      36ccce18e64d963cad8a0c3bf9199b6ce8c2c5c1

      SHA256

      83ea237dda18557e17dfc886d5402f4787e6041e986978ac6c3ce98f95066045

      SHA512

      d6a77f13a5bf1acab8e18470e39699e85fb888b7ba5179369815b13297f68a68e04a64985e12137a1bee1648bd93bce9ced165b92d0ea6ae9506b03fcb26a493

    • memory/3600-130-0x0000000000000000-mapping.dmp