Analysis

  • max time kernel
    162s
  • max time network
    172s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:47

General

  • Target

    e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe

  • Size

    158KB

  • MD5

    37c62627383200afa90abf92bf5c4f72

  • SHA1

    ba0cce7a0b27b4d6c29abeb6d02f5bc54c6c8cd9

  • SHA256

    e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0

  • SHA512

    9eb9aade0df35394f2b326d630dd24899edd388c7f19f7da81b99b347ab402994f0ed4540c9a8bf58f2e1abada2632e98b714e615e25d71ee5892d2cbff16fca

Score
10/10

Malware Config

Extracted

Path

C:\g84854-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion g84854. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7EEF930332CB2D68 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/7EEF930332CB2D68 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2kEzfrIq1WZYq8KXVmsq4zYfdsiA5AF9MYd3IrzB0HwBWU2s1ZfCIhzCj7YH7T76 uK1y+9UeTgBrALeQEMfFslbRQCpwmz6pCLWJPAWOQoMUtVAYnVGoAiDZXL0x1Mld jDKZrpqY1iKOWqq/1/7ZrNUNpOlITcz+ip1e3hvUkoj1gozCTd/bwILDgQez+cBP d5lkfjG9jS1W1pL9nkw5Lwko3P/pm6+eAsuo7s/5bGto6Bi/lMCqNOvQeYdyWo/k x9R6OHqT9m8PS3PSPE3YRs3UXDIslDeiSC96vrqOMkrbhqv8UYWbKM8OEHsNslax kojPvC7ESsWPV9kCLILs+jf/6aHok0zOw6iik2vfOOVxcEoW6SxFj5v3xQxtCZX4 IrrcHzzZRZxnfxn0OyKwfPGP3lp54LytaWp6KNXg3DjI/dQ9AYFg7f7XC9MINARB cqog15dNSgj37kZNzpxpVXW7GfyALHspTCgKXEZXkpKVnYDhJw+Cjr0QBynWMcED B0D9HEFdq6MUaABP7c9AmgL5YbSkwr8jDQPk5l+TYwsvXG9O+j9IbM2PpJvmsxqs jTEXsf2isMutopE14IQzQWbYryNZbnY0S7C92gjuYEwiS4k1ErWydCCv97j3RLRR G0ZKpLHZTEBNQfwx/EKNXo1EpPIG+6WaCwHHH9Ez4uGyhaK4P3sBZUfCsE15pxZM WTiwwhF6Jwc3Z0ZAMqc8Y4VaDPmbUWJr6myMGdc9q/hv3yqTkZdhZRmQG9IrHNc3 pdSEpiFuE9s5KnIuomGNe2MN/r9/K+jGO1KfgEGkYTpFvjntp+4wDrfgjdLkXruV pDzphlboEcxpdJMMyoZ2lCh5ybbpH5JuAd6WX9bdZ5Yf43/NIbNkvenHO6SBWURP UO14Wq7MqOhYl+6dv0CbRr3wKWIdpT2ytGAROQ0okjD4F5XOZuyzS51Jr9c7nqtR tUX6k/Lje+csGszFJ4HmHVHTH0sHMxOZ1p11MaRS1s2AB75l5zaW33xkjlqbfaRn GbBF04Rtnxp3AyiICULhfXVI05nXdlgJxv9cCBnPntuUynAG/S5V9w+ZKSJyIlqZ 630V/doYff3O5g== Extension name: g84854 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7EEF930332CB2D68

http://decryptor.top/7EEF930332CB2D68

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 24 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe
    "C:\Users\Admin\AppData\Local\Temp\e7ddb20095cd733efc10fba3ff1a8b3e83767cc900b5a976d4029456226612b0.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:4284
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4412

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads