Analysis

  • max time kernel
    173s
  • max time network
    188s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:43

General

  • Target

    f46572483825d89934f8b7379a73daf8125ce15b0d5a168468dbea0736365dc2.exe

  • Size

    116KB

  • MD5

    e298d0179804693a959fd6e2d5eea680

  • SHA1

    a4d9fca81850aa8ae272fd0e4bb6ba9c11b14b7c

  • SHA256

    f46572483825d89934f8b7379a73daf8125ce15b0d5a168468dbea0736365dc2

  • SHA512

    c6e4d482290c469576dde0706b123464134bf64eeb31b773c9b4e14f7e6521c38558477e06753671f8dd7e5393b3ba904ebb2d921e3129e3f461d688a71ed893

Score
10/10

Malware Config

Extracted

Path

C:\253x60-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 253x60. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E3B687AA16A32533 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/E3B687AA16A32533 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: jRa6TZV4M07Rmb8RIeSQ9K/+Tqk4b1+vid+zWL8fe/SpXTPq3L6VohpE0reui4zO ppWdKH5h+GamPVWv+mOwwP6nFEEyapifkxZkvUEpUIqUgOhDZnlsWWmzPpRNVeJ5 FAbLmHDqu2Ptr1COwEvG5XAJaRrVZE62Ijp0OBme+SQgpbrmYc7vbbVaDTbyxy6N 9IXFP4Ig21SL8l5cXOipWZn5bW7RWi/t9EhxnPB4lwb1S/V/NtQ07sCF0PFwNEoS 5wQvSZoNxpsHTgAyfllwFiqOt8/Ww8Re9EoZVRZIsln5PiGVQhx14GUwiYrAvd2z 08arzKXDEscUh9DiocF2As3XAp2k64l28ZKaUg6AUCAbl4w1qz/C0QhnRsyuai14 lRCPPzF95DVXa3DbtcQjnMvjNkilqwSPtj+zuqrZzW6vjcJUW1h9im/DYb4zldlK e2i4Y+3j0GL+LcxIQxyYoMDIvcQzuzj+npoYaggPn/yIwikQJc3JSBEl7o9uygtw 1Kd1sX/4tS2bX6Jnrjp2Gwo+doeHkgSj8MHP7qQLENz8huAWdZf9kMEGMdqfsYfP //b6B4lSiK8O+grpx/6Pwy8b8oSRMVOICFBvCwi8biqnfhDZjcRamTgNO51Qkal3 DJVqi2/5xkL/rZjBW90aqiRO2xvBN1XNj7/CzxtQj7XjQd14SQ3ebzMOKZ8f7L30 JymKGvk/9+sbJ9pZpX3ywnC364iET1GmrTD+Nx4lgmRvxvX8IOFq11/Pwtjxm3+m hgXNy3fH21c6YXRVYM88XWl7rSolMvXqE1ifQ0u/G9a70+KHRvXqtITpAp7P8V+R 7bwT6tvvPs3z/o1/GCCZhSdJ6HqQGk3OAxx0t38OKocu5395nMFNgzd8PcOOliYt zAA4ggRXmIcja7EEZIV7dgHHHY5bumrjTcNaXuW9MHPC9TWhhMB1npjpqNIpkzjc CjgucQ0a6SEz4fSEuEPU6dBT10MBedDxF8vS2ED/HubJKkro0X3+t+8cfGbpXjl8 UZZ7BfvMd9dGSFomX1nP/PNTOAqzf/JT2A+ezsfOrrGILOA6ao3PG6OR7vRGEsLa Q0UaSI9mQ/YRajmUpATpmSRrmhNDNCJ8QJsdjDtWN0Q8nIWVOsNsdM/aVlhMZe2U lF5CTUuc0MqcI0ruzO06/xslcnjDQYJk1XXjw4+IjAJtYc/g6tCvwVJhRiJtNW5i PSV6YjPYlnqwtzfLOQrZeK98sdolCIJ8w5YP9Am0JoQ6gG4rRyJc7PZ6c/Fvq/Xt hbBpyDHLffIs9nasMcI= Extension name: 253x60 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E3B687AA16A32533

http://decoder.re/E3B687AA16A32533

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f46572483825d89934f8b7379a73daf8125ce15b0d5a168468dbea0736365dc2.exe
    "C:\Users\Admin\AppData\Local\Temp\f46572483825d89934f8b7379a73daf8125ce15b0d5a168468dbea0736365dc2.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:736
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2444
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3988

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads