Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 00:55

General

  • Target

    d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f.exe

  • Size

    165KB

  • MD5

    e2708d3c57b562b01da42f9e7549781f

  • SHA1

    3d82951dbfab5629187b26ecb7388b7a05597f67

  • SHA256

    d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f

  • SHA512

    c483968f981e64021025bf4f42424df3cfb88a55bd4cb7f2aa904515eccb85e239c3d44812b28d5b617b6b8476dcc3f4258465a211ae6e6725adbf1850234619

Score
10/10

Malware Config

Extracted

Path

C:\yj2k2h4d-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension yj2k2h4d. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2E4252EA90FDA77 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F2E4252EA90FDA77 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: hHUf56+cBKOXWbWas0ZBhmqfJ0v5/lASQCtdJYkglACT8mtr3htOQbvdytUGI0Cb fOKjny30nYZmMiDBCGMzd0sS2F1KEUdQwJhfYtCuYdriHRky0GT6yde7zfgt/iFL EskGZ9INlCOVsKn9G5/JaBBTWMQDlAjagVdqXZk6y8zP9xqlL3iUF0P8Lqm7f44v Qp+rce/ExNawFkfBHtxR6lFifWxWcCYHQDuoFQPKk/DYeZ0HkdLhF5PwBSHNXSd5 KiUqMvOzdPS1/WyM362qEtwjsjFGBJO78Tfm1pkqOkMH+z2O/ciT4GHZgSt5JBD6 o56IvImddClCmzulLuJtWI8HQqWhCshM6KYQ0BzB7Yqt8ewFpa1fJz1utIMPYYHh mBhcTsqHK7D+4qNZmeRHApLBzVL8y85+SwCCoNv1p41Kuht20c7VW2J4MSUbXFBB fiUXX2oVpbsDi9o9B4WGgiiyzUdhhdiLTY92cu8Yfu77g8uz7Zbs+CgQRa5lQ4Q1 Ewcj1+g/aeAPrHyJ1DkjJjEq6NoNlJxU/7qSPZ4AJWgvk9lHNzuq25yiUu0LAKlI MijN+MdjZGBI73OD862UGh5Lp+KNCtBCVTheXXR7D2UpR0BK72SeqQW5ik/AoARX EviD0a76LIrIQ05t3PI3GZIuN2QQZ2lYzu9z2BCz57jC6KCaz4/aFTL91IGnl+MQ XMTjjdZfcCt1OLFTyZylmX4sjl82+b+EgmPA20FySG/dM4eGz97sM7xXYGKP8RKR cee8JuxJwgVtHQ/9mKsCUs/kqxzdGiHXs5cQyqAHqgWIbI+CA1NlFpcXjwaJMF2b AazVtpsbY+ZrqNBeg+9eLQJyOZQDijOhA3QsYpCKsP1pqFiTarjdTbeYniOs0KsG 9yK4l5sFQkBLuB1ZDwNp6729anrDpYLpMmif8VTKkJSKOgz2mUrMMiUnDp1CTWbw TlekRihj3rkFJAtufPYRcKvajSWzeBpt69bRJVj+R6ak28Bw5wZ6jpmLGIG74h8H FVPJm3icEHimSVgnlJoxBYk+1D3HKgMLRwNXqwBBF9euAgR2ql0BsSgi0WXMj7yD XyZJSh76eSpJOwPABWFln6TlIQnZVU4noJToSbMx3QUMUKQWGjENLrXwVQx/KBmF 8ZUNVf32BHo= Extension name: yj2k2h4d ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F2E4252EA90FDA77

http://decryptor.top/F2E4252EA90FDA77

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f.exe
    "C:\Users\Admin\AppData\Local\Temp\d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:652
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:856
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/652-55-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp
      Filesize

      8KB

    • memory/652-57-0x00000000022C0000-0x00000000022C2000-memory.dmp
      Filesize

      8KB

    • memory/652-58-0x00000000022C2000-0x00000000022C4000-memory.dmp
      Filesize

      8KB

    • memory/652-59-0x00000000022C4000-0x00000000022C7000-memory.dmp
      Filesize

      12KB

    • memory/652-56-0x000007FEF2FB0000-0x000007FEF3B0D000-memory.dmp
      Filesize

      11.4MB

    • memory/652-60-0x00000000022CB000-0x00000000022EA000-memory.dmp
      Filesize

      124KB

    • memory/1664-54-0x0000000075D61000-0x0000000075D63000-memory.dmp
      Filesize

      8KB