Analysis

  • max time kernel
    163s
  • max time network
    170s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 00:56

General

  • Target

    d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe

  • Size

    116KB

  • MD5

    3e3f3a618c91d590d7518672821e54d3

  • SHA1

    b4c731803b202d8f51d7fc07a3e05876e74d9d4e

  • SHA256

    d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24

  • SHA512

    9d256ff40ba95fca378e35e9acaf858312e8cdb6f709a8a9697cb9850095216758211985d00e28ac1704feff0c50af26cb5d293521e4538c598ee2559a70f017

Score
10/10

Malware Config

Extracted

Path

C:\ujy2fnt68t-readme.txt

Family

ryuk

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension ujy2fnt68t. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread Pay attention to that: "How Much Data Is Decrypted with a Ransomware Decryptor? In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. " Now you have a guarantee that your files will be returned 100 %. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/961BDA7384510BB3 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/961BDA7384510BB3 Warning: secondary website can be blocked, thats why first variant much better and more available. If you have problem with connect, use strictly TOR version 8.5.5 link for download TOR version 8.5.5 here: https://filehippo.com/download_tor_browser_for_windows/ When you open our website, put the following data in the input form: Key: zWxYAAwjiHw0YUrxvzFduFRtMOQuEj3/wxdKySLWvyuLVnAgybCp8qKxQy3Ibsbv yBI0SeOeAUGxq2ilr26FLKJ+kYA6/p2G/uCg0yblay0tpKL+2IKy4WuddfLpAEEM g8rPhVrupeUKuQTE6ppnte5rJJ5XXdZko+ZkU0SORI3WQWiBJ6A/XHQg9t4NmGYH 2ETpvvuqvIJ4mzmBzmnmcFEnOb8arRYQsfXSWN9DvloQikMn3q+h/LCmTOM+4c5l /y1c8QEYY3EsmNo3b22CuXweWm226bip9cZrUwCSM7Aj02i3iUBKBvbrEoLwW3sB QBCdCy3ph5Xqy1mksMJZ/EGUjumPjapIWh4Wd3gO2dgWY2HRi/UbRTb6ct17sYfQ PuRyl03YRYgKS/3TgenyPGpa5J5QtSvlwyD1+rQQTcQGct8HpSdF3x/WJoclxy1o gHGSdukSiQQAQMfN2BYjGHrtv2VpSlIqU4mnqfDAwVO100/HMX1J+Vyo6tDaSwYx 9u6Rk4MDg3xQGY0T2G1DpwcCM2wKF0F3M5s/K+Fu9HXf77tIgCAJYZs99fPksBBu iLjLPPCHHyVqMH0TQYM+XoleIs8XQKGQfWgIcegbfr502/dSTeqzwJdAJ5d8bp7e piDCuH6B4O9+iriPODUBkFDTR0IbcNUocEcmcSz/au8V4AEFDjf7nzqb3UlaeyrR c5jrFBrucIABHYvFjS99rYw6+wlfzpNQGWHg7FX+YkwTg/a0RoDRBaiDP6C7Gp4Y qx6JgAQOESlMHJHSLPevrUlBv35QJlpDCnBryYuc25yWiyO177/WmOHM/sS1FE7F n5IS3o5Cww/WHTrLliWFzvshTo4hz9dVsSy+N4xxBLAnsEnLU68W3xIosvHxmq2V Pqusj+tcTl1fCUtNZxcffbv83TE/CUatIZD2DUrDtHfB8bhWNtifaMYpCVZ0oF1p PuuCeXCo3tO58k5JMNCWi3iRq+jNWoRWKZgKRJW5WCXxK3hBCwfYp4r8HsW+703W DaOXrUY0o8XCjXWNH6mYAr/uYlntE93Bfur6TOr7Ye8wfnNkxScJL5vFvIGhMy58 Yn/XSMwgTsazkoCkET9jNKdKul0ZDqD7pNe7lseYaCC8LuNEOBvR1fpXO8A9XRFy UobGG0ufir87kol9tHp39N5Ip/ZJc3cg8ifFpwAro0svHbBg9AWfyg90rD94lP8v rS/6G7Y8usAEXeookScDQlXhj+/I7eVkP++QOzuOw3uTV8H2gXsGEfKSdBxDquHP A8KZLcpA1AadH8N9bjiIeYmB2yAy6/bU Extension name: ujy2fnt68t ----------------------------------------------------------------------------------------- postscript: In case you want to independently decrypt your servers, we will be forced to put the databases of your companies in the public domain. MDF files: DB_UTILITY LeasePlus LPSecurity LTShared PaperVision !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/961BDA7384510BB3

http://decryptor.cc/961BDA7384510BB3

https://filehippo.com/download_tor_browser_for_windows/

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe
    "C:\Users\Admin\AppData\Local\Temp\d82f8d40cedc24ced6d9a701e28ee133e7abbf94b53a109a33572e9e03b87e24.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2804
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:528
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1452

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads