Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:07

General

  • Target

    c3aeefb9c2496dc0480e09a71615ec59750a993e4ead901e8afde27807023e95.dll

  • Size

    116KB

  • MD5

    693dc51660715ef8392c7f0677e046be

  • SHA1

    f194254a742d6fb1d9e2ec01624993257176a01f

  • SHA256

    c3aeefb9c2496dc0480e09a71615ec59750a993e4ead901e8afde27807023e95

  • SHA512

    a0dbe72b15bfba16be66e6fadd5630d55bb9c16b6eb59b4ffc1a0a830e81b1153be98799d368346031c09e145aa70005dbf3b81545c40369184d2f95107b04d5

Score
10/10

Malware Config

Extracted

Path

C:\vqh597u-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension vqh597u. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). We have copied financial files and other important information about personal data, it will be published on the Internet or will be used against you if you do not pay us, so if you do not want such consequences as customer churn, media coverage, fines like GDRP and other damages, we recommend you to contact us and pay the ransom. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/59229BECDEAC9524 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/59229BECDEAC9524 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: OH4LWZ4AjSJjZq0oV7f/zDnO73XlS4G/RmV+RsV4+GzSNIrW/v3jFgVPmYqBnknN nnc6wTRks6+KI77GTPTPAxSdscBdfcKXBCRa9ip/raKC9zPTR8Te8cx0fj151afl cEh5R1UFkJkkjHoM+rLGFpG+D54faOhUs241ztQCuWsh9q1SGCXvDxgxYLUTjQ7w kH7SVdwh1EucRbn2nPB90YN7IXLZH2vxHD+PsCuvRo/WN0nFdFAue0aomHZspdT8 WRxQ+/Wkbz6WJCTwsVJ+PF3vzXAseVzv4smrHrRAn7JcK7XVAFuX5D+kd0FqLZAc 9mb9rWfg3dx4fNTQQq8wywgr1zxP7f97SicYdzu1bnm/9zHw04b3hn3iF56VA1wS rDAjX4EquwoP5dcRipulB5na0D4KZPTwlHVyoQwLlWEBKZOqhpzOFwG78NKC+IgY fZh16MlhlDhSxFoRPeGEiawCPBu6hVO7JO2NdazBqwEmp0sdjt5rAClRcWKQ2s+T QiNW0Sbg+8SW6g4QAyEKTSkLIEMsIYIBIoXQLbzk0ABtUhv0/2TRshdHKoBdWo1H EZyJgQlN1IpGVlb7d7KMXfZh1BmEG63rpBJVlx991zXttU8pWoF6Q0ngSdeTMkOV 6SVnVuHuSBiB1mDmI9uqvbAaZsT/43Vfe4uPDbwH+93FSP1YYM8cQ9GUDaEVF5rD NXuq+iv4dIYUhcZUxgyZard72R9XC5ekYm6Rg+vmNiz23YWg8SJCIa4xAaHGEmI+ lh/ADV5/nYhgRoCIUJnWe3UfrGladJqKtZ0YLAXLKp3LjRb+BFMGLyoKvtfDY3lO /42lRQAsgDDGxSM5hTSNiJPuXXVS+i2JAcZXOlwS/FQsazP+7owDWCeYVO/DgvgO +bAPQfJKyeCnNpkJigvkogWaSk4b7D3VfChQeErejSwrisM9U7OveI0AKOsklVsL 8ZfYPWKWbX8+zSNDAqlPq39rRyNc3BWK85sXjDxQtWq5LtT6EQI6cbKhUzzLOESI B+bz1sRsPI5QNETCDliOUGJmeZGXPTfzsHH8i7m/c41P2uWJcmh66V9Yjv7zIeXA IP74BsujSXqypkxNBdwcK3dOQBFB7N4q1eOWP8rIv4piNz1PRfYvJqY2zOpDJtzc qMf1GjDqaaUBO7g19K+3s5SdiUYFfpjnLpJW4Zf+p8Nc82BdJDYCVL6WfiTLyRuE PMXpEFV3bt2KgvBJ//L+YOIHGZrCRYfpfHtzBFyC0/tbHzVMCiAUM1BlJz+PJ6nv bV2M4nwLN2HcFOU+UYYgVxTrDImmvqyQGj0= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/59229BECDEAC9524

http://decryptor.cc/59229BECDEAC9524

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3aeefb9c2496dc0480e09a71615ec59750a993e4ead901e8afde27807023e95.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3aeefb9c2496dc0480e09a71615ec59750a993e4ead901e8afde27807023e95.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:780
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1344
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/780-55-0x0000000076B81000-0x0000000076B83000-memory.dmp
      Filesize

      8KB