Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:07

General

  • Target

    c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe

  • Size

    158KB

  • MD5

    21409a615234a47e7799d1d9a7b3aa56

  • SHA1

    cafee6c61566fa05e6f4caf53e8ddbd4d604a7c9

  • SHA256

    c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757

  • SHA512

    32468ccc092fc9222984c912dc8f0f997d13d0754530ad0b03cefaf76381c3be66cbf1fceb8b8e6f3814b665d9078d5efddc7e9b2e38514bff3d9727d634411d

Score
10/10

Malware Config

Extracted

Path

C:\0096aka-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 0096aka. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D052AFA03A8B7E79 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/D052AFA03A8B7E79 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 7dHj4KA/d2OPrzRvx8eqF3QSAB5c6Op5dNspfLt9+EYojthlJt9qiIzUGGZ5kvDX 3kWvjFjKBOCqszrH6Efga91FdoD8FUv1Cl65KzwG+YGhElXF4LW2QkAvbSV1Kk2X cMcqiFytkzpRaewZcrn4ViVPYUVAFAzGS6VASYm1NMtH2JTomEU5Dq8rTnXFksrS Jd963vuIrEVTPukXOeopHxEeqGUwmD1DyBKBZqXDvY/YNfyqlct9n0Vj4If7xygF 6LGrjUDTZBSthINFsUhmiFeGtVlyHIG/VIuUZpVizo1kfSk8S7vc7eV8Rbeqdbzm pE6L9LuOYmqfLO4WKHiYJ5Zc13NDJDvPjArmR9A/OvSG83DZAc8aL5j4Rg9386cL w/7E8gXHk8UKEVCRaFv15HdwrF3e3xXwbsLsJM4znNfL2/SHspdr8QjdLLden51W ulfLmiVlOyY6e2WAl6rXK4plJOPFGX6hrrka58ytteKxdTyk2UbcT7sqzw9mK6qh BGC7U3KKJYolHNleUquOYd4NkXPvF9PSQpDdYK/ZIGk/SyhkVxUqHLHO0h8JKkgH u6E7CRrOz9RmMzeNS6pdGl5zKlAtHrDnYz7V0HZlIPCYm8hjAZT2chzijEh8Fplo gV+jOYwtObpwdnuVK8iDUeqwFapqUS4e+bATFPe4vmyEqds55RYP8aEKZQtKozKg E7NQMRucGhgvnoq/MmUSxQlV8TugaOoDMD2HitqcwrSmoLPsYRpdReQjgjHOsoxS HfKHFPM1gCjJsgZd99mpQ/9Bj5fY0pbDEuBK1qCU0YhO3c4EmNhVmTYfKlWHYsUc MCPqTWKRVtniOepQmGsX4vcmUxbZomubOaGsxhke9ezfJJHS016mkXn0O4yqnP5i pyCg0Xj+vSEKcks9D8gmDAnWTyuUasNynf8ycAEiqrQbbnkPWVBtDBXr4jSmjsNR JtoqfYlQNB+4ZctzQ89XjFXsCX2vQDw7li7chqhxGA5WQu2LqGKpmDHrm9LkC4FA YWhiWukWJ5CIc9z/usK3WW4Zq9Bxt9qiUCMqj0TAiS+rXmwiMJIAJM6CbWf8KB/x EiXMr3a1QangfGNFuNhX5zZL Extension name: 0096aka ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D052AFA03A8B7E79

http://decryptor.top/D052AFA03A8B7E79

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe
    "C:\Users\Admin\AppData\Local\Temp\c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:332
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1700-54-0x0000000075601000-0x0000000075603000-memory.dmp
    Filesize

    8KB