Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 00:48

General

  • Target

    e5bbe16980677d0336ae0e6830ac887bf072c70caa6d9536ba146e0809bfa606.dll

  • Size

    118KB

  • MD5

    4e142923b149ab179984940e1bfb6041

  • SHA1

    f20a1803e38b4d7b9437d53a95403fb0b6387f11

  • SHA256

    e5bbe16980677d0336ae0e6830ac887bf072c70caa6d9536ba146e0809bfa606

  • SHA512

    6f6ece3f0152811348e44630a3139f2f6ed46fc43de97cceaabe35616abdb2c4e84ddd2e4b2c6350a78a49b8323910d09dc342c5836a2d882e23f76f2aee6fa2

Score
10/10

Malware Config

Extracted

Path

C:\e5488n840d-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension e5488n840d. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5D2FE04015D326B1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/5D2FE04015D326B1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: dUomdYIpLLvt9rHhVD2IDdcxpVTxbjXsRfALplQ1FiR+3IJS4X1xTgyT+j9QWQAr FXds5Dbe4ymJmRvPPrxUof+b2fKUtqRlY0cXbb0DgQQnglrQMIHTJ/qsenejF41B 2k3sGuAHxe5VsnCR6IGWILC9nn8mqSdn1doBtDiZsnQZKAKmuLHKx+9Fm/YwtvXa ncS24iffupbn1vJG7yXJa04jq2FuUap6RvmBZI+NC9KQ0zUXho0SXVPcCZ2QvcDG sGMhvrq18gGj6hzz22uXm07NoBhra9YBxIubY+AWVnsByMTon88s30fgnWs2x47w qt5kRQQ/O8teXluHd7CeM6FEValiErOdGQuo4ZvVkjonssbjkAvZgg27iTl15AtV s4VVsHz6D8opFm3DI6yNMgBQHUdYOIY8MBjhpDk+K01YYJkva2BlmRJUSHf3lozV QTKcHCcyx5zj6rCiV0RdHm8Syi1SMgoUkofhQJhp0ce5Yi4ab8AmO4V2B5+rkENP BJSBKNQtgaYsuG0T6tX7xx0nD7W8l0ic144CoF+o5RwjFbVsXVJr0G2Cw5VeqWH0 S9kc/aCKIH5IVXRyr6L6PaiSjjZJle+GyK87MyYNsbvzdagrGRuc3vWAom7FPdd4 IffWDNYvFel8N2vIFgrDwT6ffJfxymZuUAdZfDlo73pJ0Yo7Iv9CKHWNw/Ks3CHZ 3+ZFnsmDTPU5yOucAFZkOf6bv7gKPMqtGPOpGkupTpObqM9splE9nvSXmIrd3Hk+ sbmNIvQ4073dkiTU/7x0rKjCugaXnFAACJLj9w9pIVq3Kv4hDj2VZxqHQ5/BZmDL a8/KF7rwBdqIlpKpwJEjAiBfEkflNaW8B7R2YXJpbeKjYbuI3MQdORogutYCN7LU LzwYPNGtC30l/ZtGsdE9WkH/uv2vRneK8Q7A6PmR3t/lOP4ROmGO/jqY3/8BkyhB v0Dft35667cn/TxOEFblWzfGNQB+6Hh/ACTmo6bTGiSSUgJoeojPUBIOA0IhvKFG SJp4R1i571fBXOwLY/rnuSPytxHAlAF20vn7sO4glR1EVF/YNhYDkW1yWQrbdej6 KP+ABersufdiVwpj6ZX6MWZJi94MPuCgj0MXNNEpKJZfKAdXktbbPKgE9vex7skk dD6kq8vcBHlNDclkZIKxhdfZ8gO5HM7IbzAxW9dNunvz8ToWf9WBWvEjq4IafJpf SlD0sMx5BUAuY3xeLvDBcdBqp9t/8MQ5h3RJmx0CM46WdBaaPQvBPtrd3qDae179 9oWLO2jBUd7aFX5YxryqB970bymHeVcqA35TZdLp1q4= =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5D2FE04015D326B1

http://decoder.re/5D2FE04015D326B1

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e5bbe16980677d0336ae0e6830ac887bf072c70caa6d9536ba146e0809bfa606.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e5bbe16980677d0336ae0e6830ac887bf072c70caa6d9536ba146e0809bfa606.dll
      2⤵
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1380
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:760
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:336

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1380-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
      Filesize

      8KB

    • memory/1672-55-0x000007FEFC3A1000-0x000007FEFC3A3000-memory.dmp
      Filesize

      8KB