Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 00:47

General

  • Target

    e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe

  • Size

    158KB

  • MD5

    37c62627383200afa90abf92bf5c4f72

  • SHA1

    ba0cce7a0b27b4d6c29abeb6d02f5bc54c6c8cd9

  • SHA256

    e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0

  • SHA512

    9eb9aade0df35394f2b326d630dd24899edd388c7f19f7da81b99b347ab402994f0ed4540c9a8bf58f2e1abada2632e98b714e615e25d71ee5892d2cbff16fca

Score
10/10

Malware Config

Extracted

Path

C:\38oy88-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 38oy88. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/286D3BBE994DC093 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/286D3BBE994DC093 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: xdeH8bz/SUsfui+8s9pxwU4NTJBIb+utG+rYAMsH4srxV5RoosdOFpyhDcY1DRoU 7FxQ4f2Xf5qxBXnJFH79dEDpNo0IGVugigce0zU13tGbLxYtummajtwreua5DDeF fSZazMsKEUIKH6WnzEB+t4wsqA6YW9oQTqq85qdE8o8KgiPLvUkZnv+LIwJDZhB2 OAHDAHo6vInhqoObvWnUuXqQj3DNRIQJo4Ms7RTPF2p0MGgkB9ukxWYMWD3ux6C/ 75gU36ZlKtvm7xWmF/O39+w7BZ9G2dicyhuhwB8cl6WiWXQ8wQvtmLJ/TVErdv8e cahndO8xIp6Tcv7u6rOFhb5EnhNs5AOm5rhRFuGh+0A41QRjUjKxddbKKc++Uo+Q T4Va2PdK1zriLSpDjQllS52qd8Nlglvf3CUdvdPOHi7TxtBVrE92jiqZ+eg8OfCL yejoaWEJyucsHydaBtktI0VFhG+s6U37RZHzojhv+ao4wX/GPGxkodIEX7IFRTSw maN63S3+NiDEhBGJfEQhn7ZzvZuIUAqksJm4VbuKgJkDn01YZTJ3A/86ZOdA8b1C Paoen5FdsHB2NuNf2/B0xyIFUpU+GPeKOqUaXrX0YcwVwMLhr0i5V1T8OscM3zm8 hMuRxgvACF1obGSWN9CPBW0wMb5i1jNJKVnfhFbgVOnbBRDYd/zO1FnEkEoOeIIp xoA7fBbu20CGdsN04uml0xHqpK8S5SmQWO7LFf2h09fy5v2vZHCQzRVs8yqU24vU jkJN73tJ3Wej3ud2YBP70E4OlWrbho6/43+1oJIq82APd4/JSdguxchHgmJaGEt+ 9UvvE7imEkKdd6osTMyw6ES4NJfT9nKB//A1UAB075MkA3oa0/YXcs75k5UMon8W OpBtGuFEHPuRK9YC+g9PTdA6oHPd0e+1jTlCOH1WIeXdUan1JB5Nf4Le7nnrX/cX 4w/C4DnTBmuFi9htfW0kIkTwhZb5TWFr/HuNkVomI+pgu9E4GsEQED+yM+6VOUST IGlTqwxgK3pHLAMJOqQ0V9bWGFiknVkQ9ptYsULjy2QXn6Yj3qErxgo8CxlJYDVs RUu0JUO/fysu8/9UERQfIb6D Extension name: 38oy88 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/286D3BBE994DC093

http://decryptor.top/286D3BBE994DC093

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 26 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe
    "C:\Users\Admin\AppData\Local\Temp\e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1528
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-54-0x0000000075B51000-0x0000000075B53000-memory.dmp
    Filesize

    8KB