Analysis

  • max time kernel
    158s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:46

General

  • Target

    eb486e276b6fb580c58508d71d303b0535970ac243021eeede55bcd253f114cf.exe

  • Size

    160KB

  • MD5

    66a92a0e127937b30b28a12cd8b52dd5

  • SHA1

    63952f7438d30ca35458f2cd356169b3a0d08607

  • SHA256

    eb486e276b6fb580c58508d71d303b0535970ac243021eeede55bcd253f114cf

  • SHA512

    71e927ced4f2f01fefabb57a9d578e8732a1ca8276945b04b0fcc7f93b0d1e803204266aa5082db157ce6cbe7445cbd88d20f69e8df1027fcb0abcdbee2cd7f4

Score
10/10

Malware Config

Extracted

Path

C:\b7w95-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion b7w95. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2F2D59CDF8D9055C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/2F2D59CDF8D9055C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2YgHUkUFNlvVnjU77WJPNdUZ6FPj2XjdID6wWrl2vqPgULLKgKDXa3Qvs5gGF4jR PJG9BFoxj5eLYI0J9IKpu4zxsYAsljC9Rymfa0Bn6o4QECE5fkchelxxOwbb0VSM a4mUy/ccK++prk7doGmW98MMr87PFx5ctBF2J52GNTp5boYYzRFJmE9z6WRMEr1C Z8Wa+lGNyOqUWNPdMCQ1sRzMGG547aZE0Knv/+WnvJaCev3Kcypj2BWAC77ReYbp bre7RxpX7tlGCRPMCmvP8Hz8fmee08TosXB6Im3GwZuqaHyUTBM+UErcgeYbABX4 icvifwoNVhn1WcwYcMe4u4tid4xlTYHD4w45bNmuuA2gYOFUKTkPwDSv/+o7PwIb 7ZLFOE0rq0SK6zhSie3Q77nWK1ubWy3Han39yWFPAJCHnpIjjXKStNkjLktVFgZ2 Oxex+vqlctwpS3buNCvKAsnyntCkmloJkpENOvXmdI2Z2TRGv4z/VXbCa8M4eZRt uTiVNal4ItNJJiGYPGek+uf3lW5M95dU02W690ZceyI7zkPxsYiuBdh56L4D61X4 JG8p+sVg1EzKVMzHfTmNaAaVFRuDN+b9mcAPSkLXhtYfBiwuOg+IJmrWuo3YeGBe 1lRaVLzRRelfZSJII4favhSxysETPh+00AORF5cDIO2UTN1JYAUrQXC7gk09r45r CbdsV085oeIFct/5Ds6ih2JGlKWQgrfJUkvDT7NJoatahga5Kz5F7D+72OGORpzn xZsb1qrckckxVN4FYeadTqn6GlSRFFz9FWZVzYwmE9pyaACaJt70FpTphiiW017D 9z1eb6d+FS/suGQSQsmcRi5yzuBQAo9t5aTqSS/I1sAGeeFirBSiNcQYOruJUkJs n4cZLbS0J8uzqNN20cErcPSZK1vzgDMOY6ISaWmsHKZnmoxsZnZnXGFUOev0qCdT pDsxGG8rQe4kp0v9W7HEM5+kQoA6JebC8xqtj2sH8Wl57vQsC+U/5lF47V/DYFJi slr/hAahs78SN7gJDU/QVaoVd5jnPV0ocBOEGlShtpc4feNOO5P7m491mX2kJip3 NIpGLTUmBHMofENX3SgY0joQvpATDnP9ysAdA5bYVn9gu0F3XC0= Extension name: b7w95 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2F2D59CDF8D9055C

http://decryptor.top/2F2D59CDF8D9055C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 14 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 26 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb486e276b6fb580c58508d71d303b0535970ac243021eeede55bcd253f114cf.exe
    "C:\Users\Admin\AppData\Local\Temp\eb486e276b6fb580c58508d71d303b0535970ac243021eeede55bcd253f114cf.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3716
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1016
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads