Analysis

  • max time kernel
    161s
  • max time network
    175s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:50

General

  • Target

    e2dbd097b846feec6f4654b79ea0ac23463df4a430b750ebde3eb893d3daad36.exe

  • Size

    164KB

  • MD5

    f08cec4343560f6f2679da09f73e8a3f

  • SHA1

    63c22048495c91cc06ae7cb0461dda6d707a9b3e

  • SHA256

    e2dbd097b846feec6f4654b79ea0ac23463df4a430b750ebde3eb893d3daad36

  • SHA512

    12b44ca195d18d59080873ed417c00a449100f471502efed673be320342fd5d793e75558bf8503943c0afaa54e0b30112aa0bdaa70b377d3edda4cf62ea6967a

Malware Config

Extracted

Path

C:\n54vktu7g-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion n54vktu7g. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FC0BD2E134C2ED48 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/FC0BD2E134C2ED48 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 9JDnqek5S+jVAJsSjDkDXlKYC2ZNy9slWpUxgCHel20zem2c4vNiUFa3y3FWpEK7 M3J6Jfe+HvAxDZxkN6XxR2gyEQ1mxS/muWHf917+jdUmdD7jNrqL3UVFgXhLLPgn A7JDbeFl3mGG5kK+K/mhtd/2PpjiAYFqu8GwBKkI8pLAtDO1OBapqZ7ly/eUcq+q 44/kY1t3FjLqqJrARyzWIRBgaHl/d6BIJgnsjM9A4d28TGptLDLT/TqWQ70bhhEm VtnIpTAkymK2znzwpq9bGVmNnGMP5P/HxLbfjUXITfmECN9qGfOgSrWilj4pFDZN VB4nxzC8M7MOW8pSfi+mj9noB6hoHm7k1M/bc861A5CNrQcKChZTShfHNi10N+yo 3UDgDXPrZD7FaLgJZOAVMtCzXfI5OtJzAJaJxvzT342tL69/Ko0JSGSIXsQL6jUE WmW/tx3CajbnQpSlF8mQnVx1XUBYRaggngP0EmsSqZkhAiJ/70uX4E0ebOvuGGMa r9Nr8Ff8thy5fmvVkMH5RnLHcD+E9auEYeaZtJ7c6lpl7NC0awz6jzxWk2gsfSEa 7zgP26oydTrKy+LBweX6bn/wwRSnMVbX8KiHZwg+6jLQwFFPW4DR+msEoGVztB7F fNJ+BOwbZeh0vWbBFV9psCnkJE9Ue4MCBqn4X0DCAaBC2wBE+/0CPLlBGwo0RoHS jnHQqtwlpU1jhi2mztf+8zqmGuUrJyZLMsSMl31Puxm+yJdEAJ+m0+FTGIjooRQz jMhn85h7ZVgI/ZzJWzSJYhFSSI9G9l1XOakhl8SVc1t2BYGXQs7cAEXm+j50Wqmc ZnkQFd95NEUvkmPNDXPV6+e7+eZYx0vleDt+lKRr6qidpM6zjDdpVh7NksQIOYgy E1RIfODef68I1VLMvlnskqPpLcSUzPOz17NSotNL/aCfuEajUwFp4EDwfbTS1WaK b+yMDOzlgwbQqxy5uyJ5Q9RZHPOoenx+1DgJXfYNx2fxpEN6E/YnT3jEQYyH8/vN 7ee2TNywEgm2Efhxp08tbtw65b9cGkEH4GnlYLknSR0pI1Q5hmEfi5RyvmlrHC+G mxANWZODmCr+1X63ScCcaTDgqgALatRuOiquGjRUbPXzUy9aerPUzeY7LFq51iJf iPE= Extension name: n54vktu7g ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FC0BD2E134C2ED48

http://decryptor.top/FC0BD2E134C2ED48

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2dbd097b846feec6f4654b79ea0ac23463df4a430b750ebde3eb893d3daad36.exe
    "C:\Users\Admin\AppData\Local\Temp\e2dbd097b846feec6f4654b79ea0ac23463df4a430b750ebde3eb893d3daad36.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1288
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3268
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1288-123-0x000001F469080000-0x000001F4690A2000-memory.dmp
      Filesize

      136KB

    • memory/1288-126-0x000001F469230000-0x000001F4692A6000-memory.dmp
      Filesize

      472KB

    • memory/1288-131-0x000001F4686B0000-0x000001F4686B2000-memory.dmp
      Filesize

      8KB

    • memory/1288-132-0x000001F4686B3000-0x000001F4686B5000-memory.dmp
      Filesize

      8KB