Analysis

  • max time kernel
    159s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:07

General

  • Target

    c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe

  • Size

    158KB

  • MD5

    21409a615234a47e7799d1d9a7b3aa56

  • SHA1

    cafee6c61566fa05e6f4caf53e8ddbd4d604a7c9

  • SHA256

    c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757

  • SHA512

    32468ccc092fc9222984c912dc8f0f997d13d0754530ad0b03cefaf76381c3be66cbf1fceb8b8e6f3814b665d9078d5efddc7e9b2e38514bff3d9727d634411d

Malware Config

Extracted

Path

C:\y2fs51o8d0-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion y2fs51o8d0. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B7A47843E0E9EE02 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/B7A47843E0E9EE02 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: uqgy8VnC8iAgSPTCz2lU363adQkmws0zucgOQoyAifNcXmx/HXByEZZL1gGc5AaU Fl+k/D4ltxMYqRTZ+ER6yieM1a3tfpkOsPsnBswcYUyAOegcSg00sDX108O3cvra 3w1186FgvAj5fPiX4T/Ci9Wo3riY8GE9tIukx3/dtmgJCPXjsuaQZbgRLy6xfvaD e9yadZ9YEV2QUtKwdFO4Eamu7tMM39pkg839mEFjYp9DIIgIhp/TCZq+VJkpSn58 4asoXvJHKhgZ46E5QQr0FD2VTjf506vuccKCZO79NExYz7eYJ2+k1/gPm+pTtVIR FGQsDBGb+NJMgExz/6pM+d5XR4dV5qTwFkpZ1BBHqbp0KAf98AmPbo6z74jzlvox NQ4x2HbI7cLeFmtd870MYtQWnaAoeezZCbCJzRQyNRiAESGm+bD9C3AemI4fJXzW ZAshuRAWCLvIG6ddG+U+r+Mw7A0xLpUIBOSkRflP8NjwY1OnY411zFJ6WAgwZdPr fBtH4Qev9x6jclwlSM5FbfLNju339VqioE70d0hh+fQRms63zPLK6EAPf4P5klA7 2w1uFYN6hmvy1zUrRcDrM/G8N4i67340mWCBsqJGgoKtYSzNy5mGUH1Kjtu9TJgH 2Ki/AHJx6A5LpuAcEY6kpDJ3r9zvmFT6XW7qj9OFSx/Q5L1LfeAecqwhdKVk+5DH NVjMHVB3VfmtQxRfcfoR+MyTKpkhgSjCNZpV6bkE5N5nJM6DMmEjJXR6MjTsCES6 EUuSc/MLsJ+VTQ952iPIIOGqQzHNjr7mRTsn2ToLDWLBl3wBypxQNJSciVfKtYnw qzCptqmPw2tYkeDYHPJx1Q3t7pMF9XeohgRZgGBVicncr67DnKnPF9PPTL8kV96v YsIYusXIt4vFyOBN1jNtsROC0XhV4iY5HIv3gx1Bx/mGgMT5sX+3l4LATBThXV1g VtI2AhWxmqlVA9lKb78lCB0gJUAZJL0GnuThMZtKJQrkNAZKesHoEXJtM+iqq8LB 8ZdC1wQA2dxNaVLtg/G9gTqiZriuGDUgi6j749roW9Dt8a+ucTGKoMNNCdT9aP4U DFY9NansQZbZVQ== Extension name: y2fs51o8d0 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B7A47843E0E9EE02

http://decryptor.top/B7A47843E0E9EE02

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe
    "C:\Users\Admin\AppData\Local\Temp\c407c0db2f79f607dfdc5eb2f4f222491f96ea3540d8689c8ed6fba89a240757.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1536
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads