Analysis

  • max time kernel
    165s
  • max time network
    177s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:49

General

  • Target

    e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7.exe

  • Size

    179KB

  • MD5

    0c2c00d661dbee9e48902ce665cba5e0

  • SHA1

    98651a57c28cf0a720b95f45c14f7af86212ea20

  • SHA256

    e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7

  • SHA512

    d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4

Score
10/10

Malware Config

Extracted

Path

C:\6pi18npjl-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 6pi18npjl. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4FF95397F1477EA7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/4FF95397F1477EA7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: LJaCbtpVLX/grjgHtVUt6FXQ3BFyQ5z9HMXXAUb8oVuJfp23EYGbsgkkiTToBjSb zf+KetxqpmGS65RdSRDwmZNhqE2En3RDE7I2r6dVdpK9eGK5xx7NOe0rKRWbcTnJ 1CQK40uUKtsIggOdoHgJcP+Cg8pJsLdF1tcejNj9l+cdFKQLccrFhDtW9QTUvxtO ixsMyi+Xyae/FAnfGQ84lnKQTe0+/PVSBNX3ILZD729qG74p7KaFxQPt37HXoT3t CqWZDwb0j2/O7L0oopq1iPZEDa6BkYfAqxsRuZyDdXNtpmz3vtgY+45TfnCimDAm lm8f7bYphRIsUKKoUIf/71RqBJDr44cKfbwcS8339a5ixNTR3VYf5IvX8LW2mppK tqtNUYOmJ1U+h2ZC1VAaMbMgZyC11M3ifZV4X+cG8pK4GR1alYFOy2Oumr6u5mDG cOXtod65GvgEnUt8erKpwWQsrLJuYDtFKPW8fftSQb16DCAk8sDOW/GCWRvodYAs HOoMLsLsOG066MIbJpRsih8vKaG5V5lq7DqHbXbK3S1TNXFAhzgmle3j5Xi8Emnh FYHJI8Ef6jBMfboA1Tt5069l7y9x6QkkNPJVnQa1lH5JMX4wig4bFM6bDuiOQEO8 lQHj0td/BVhCv5DYklQYKgO+JIS+z86T0UQBTlCn8F2TsjEX2R4+f4w5qENvSOpz Hupupymwe6EPpfT9ZbbEHdnwkYOX8sRf370vbGUT471YKnQCtz9vWz4TO65KlrQJ lPU0hmfydgeYWZf2f1PUpUtNhFPAJEKQdCTn4PuEAMWHuXkswAgBZ2MO36NP1SSL fzuBoatx4ek8BzP2hyoBzyPl3qf4g2EMqMnsIo1JhmDIIXgXpho+/WDFDaIYyQ+5 hVxX3i8k19iy7BFLrAyQxC/b9ymQ2QCCAySnBM/lcjs5xsB4nsh96pBoPtO5G649 5s4eBvG1hbHbZEwgg/SumiQs4NdhrH18Y1yUhvm/TfzUWyS6u+PvGWWOYSA1j8M2 AgE5I9TyrOMSnhrYXP1KEhX2/rRzLR5x4Xmm51cD1TxfUrg6qQTLNiFDqRmqgJFQ DaZkusdTX06Gv6JA70v2eZXUWBtpSu3ohUkKP+URaZ+k/N1vmBb69TlV1B4O7w== Extension name: 6pi18npjl ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4FF95397F1477EA7

http://decryptor.top/4FF95397F1477EA7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 26 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7.exe
    "C:\Users\Admin\AppData\Local\Temp\e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2512
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2124
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1172

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Impact

    Inhibit System Recovery

    2
    T1490

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads