Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 00:56

General

  • Target

    d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe

  • Size

    116KB

  • MD5

    3e3f3a618c91d590d7518672821e54d3

  • SHA1

    b4c731803b202d8f51d7fc07a3e05876e74d9d4e

  • SHA256

    d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24

  • SHA512

    9d256ff40ba95fca378e35e9acaf858312e8cdb6f709a8a9697cb9850095216758211985d00e28ac1704feff0c50af26cb5d293521e4538c598ee2559a70f017

Score
10/10

Malware Config

Extracted

Path

C:\r8k6m-readme.txt

Family

ryuk

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension r8k6m. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread Pay attention to that: "How Much Data Is Decrypted with a Ransomware Decryptor? In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. " Now you have a guarantee that your files will be returned 100 %. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4163C59781237900 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/4163C59781237900 Warning: secondary website can be blocked, thats why first variant much better and more available. If you have problem with connect, use strictly TOR version 8.5.5 link for download TOR version 8.5.5 here: https://filehippo.com/download_tor_browser_for_windows/ When you open our website, put the following data in the input form: Key: HMxIquh5aUsaDtRZ52iQ+B3kSr3RNlKpxShjWGby1iApBtCACgH9t0scGnKmNzs4 orqDuPtsCP06cHan/xqXkzYNDEjvGgM3FC2PBHs5OcBHkO/jCXbRzkdtrY/toQze P3pJjj2d6CrYDdsSXpFQqCOg1tE/NEoAUgScTwqIOtymqIopCySz/bAukasfwaoC HLbCvRyNT3tDucPlxfLy2D/Dt3RdvZJW1oKrpv/ULJtZFpadZkIaDu/O2UhMiH6K pIgVFydyMMJ/qTDX8KdQluoF2hVkb15jaejuAZXkf4GQr4ZmgzyPWC1Ml4EUpSr5 XW3+GPJT8RyDBQESurk9zPC9aQVgxRs9BcPW3PLuAlBaQys6NjWdbEvQBmvh6hVu aTljCeD9zNxC2bKmH1UIPPvtS7KScjNGqRP7OGYMGLZPSrycVro59WfdDFrFFQoW VLJefMnZhV3oGmdgAeg/Z7ULMEjUnOPcJup/hTYVKNl5mOmL//ZB10LEWhmIVEeR zsxc8D8XribTMYH5xWWQpAPoSeO7NtVpD86C8W1noE6DvK7OChYmEsbthuOt9+/U IeJ8GxiEAGqvdGZ4+Ug1VszxLfTBjwo0H5MbNwwngrTyxcyfp0UGHeF2cwgmW0Ua 0REA8U/bp/DNDpw/ipj/8INQ6KmRc6NipPK6DRIDGWKkRd8ugtfiYu+RgGy6wGB9 SAUnIwfEZMIgVX5HJWM3svSGRLLhRX5bGMdTfiy45A/PBV7M2pq/lC9FS9zpXZ+z GGAuhFcIk6lovAe4/fjb3YhTBCFf9VzCgghVEFjikSvpUbsgV7H38M928Y93spvP M2TRRFPWToy7w5w6ep+m63VsxSHD1gGVqM3o42nDPHWz0GnMyMLjdxRLBUBZU36v 16zkeQLkwj4naOi6fISfv9uRktSKKJAYoozAi2B6tuMEutHtjAmRhLlkVSuQ3Kls TQGZh+Zdosrhjvl9t26sC1AVGgKKkhKVZHhYZGJ3Z6HMX0nTD0j4jMAfnDgSrmkN CbZGzPlYBaVLpHAP1jmN14gDh4LOFRET7pdu4SpqOtvdwoP5LDm9ubuskEBpfnLa eFV/8emVY+D6X9gPpLD3uIsIh3tgfyjestjh0y5qt8kHhfdoiFIhZ4oy3xW2QUbK 2iA9w18HmlagsC+ZrlQ2kND894sgFeg8xrIMnJVfkC/ZnFmuXHFqn2JLFBBe+Z5F CGcvdygD/a1NINpe7uWn4ia7e1lUoErU7G8HRMSNCgLlv3PBEalnTA8YDeKg3T9r 3V5qV6KfNp3KxZTEi7Ga3ndjn8fJ0g== Extension name: r8k6m ----------------------------------------------------------------------------------------- postscript: In case you want to independently decrypt your servers, we will be forced to put the databases of your companies in the public domain. MDF files: DB_UTILITY LeasePlus LPSecurity LTShared PaperVision !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4163C59781237900

http://decryptor.cc/4163C59781237900

https://filehippo.com/download_tor_browser_for_windows/

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe
    "C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:524
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1644
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:756

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/524-54-0x00000000751B1000-0x00000000751B3000-memory.dmp
      Filesize

      8KB