Analysis

  • max time kernel
    164s
  • max time network
    174s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:25

General

  • Target

    a3e691b6417a17b9a954e2006414d374a412360df42a152bc8a256ebc49b236f.exe

  • Size

    166KB

  • MD5

    8519e6b492bc77e39516032e83809622

  • SHA1

    53401b0da0bf5b345d615e767922be3a039c6dee

  • SHA256

    a3e691b6417a17b9a954e2006414d374a412360df42a152bc8a256ebc49b236f

  • SHA512

    2f67019052dcbf8d41cc4b3233b4f4f720e5e9b48747161e312c84042855bb79d1258c065f7449735de57e300817ce3a242ccdb3016ea6e9d35cf2013addf88f

Score
10/10

Malware Config

Extracted

Path

C:\3u7um1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 3u7um1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/158B8ADEE87148AF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/158B8ADEE87148AF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: bbxJDsGURQXRA/9bgRovHvqg62+FHNA8WRIYmuj7id6tdvaLFsJX3Tc8FID+5bJS /E0DWOowG7uKqT+I1LXxfqt/gqfgX94lBlPNjXjME7tr25SDw1iGaCobJrR1xe6z HNKHmjidhqvDnYIWifGgVq50bcV9wa1wLncsSHtcbc4MJigvkuK0OM6NoueQtsMb 0hewSBiLgq9tb7RlpPEYtnJhjsMDtb99mhqD+zYF/UtTjmL3tIrz1kDiZdd5T6eh UqZSkclSn03xyBxrolj17cdVNKIFAadNhennvbIPakI2x+cHlrUziOHYG9bqQjPS gUVf5753r3//mccs0JMI+KrJn4qqPDVkubX+e5scAxcUtrDvP/E07v2l0DR171IM puog+Q+mf3CRoRufcU0OJOOqZTDefQrLwewU2X/0qX1KADKngaNMq6/icX1+xSU7 H1Z364RDZhShRBM5rRuFFjJespmiz/hqru5apWtofD5GtHpvKbTn1a79ubcPwJhY vdBGia+6Mt9wvjhdnIycAx4taHgYY2P34XDdzZgYmOGRkjZ6cE1PsLPKQl4KNegq n4EdPeamoH4CDXzi6f9a47GcQUIzeHFSvudv7tkDEbKVfTTFPzTchP3qP9l4qQh1 YvU18xeCbEIwYBYRTPH6tQYEI1fiaAGeAYNbapW2SMbkVqEFhO/TB0Rp1H6oEf6J 9XclmCKtiFBhdraXyODQcTIPbQ39Qmsl4Onhgp8h8MsEcyC7NN9Vy+nvl1/sB4ZV 1F9uM55BBV8AzxGdWoIjeCWCpNJpDntwCnwSIgm9tIYA4e98/iNRGJNUdQykwXYf ym7Riw99tXweHTgv4NMQAJYsiUXchNGkMZGeftpHdW5yXcIpCBewPFYqodO3j+KU X3PF7k0hPz2aBn0IOXtsrb3nQ6u1hrk5PKqa7js+QO2/lhMIj5NOJ6O4Y8bsIuQL uMMxKxE8/PR0nCUWBcVvb62+PP7EVDxwHTkhDJZ1gB202ocYCaNEj8WpVDvUtm91 WflJ4Dn8J2tBvHd+Hbp+JFpDHYLljCBpSogIXwfXzqGQs9XUl6d/XHHyvMyxWfsd ucNwAle37IFvLtTQ52C2BI3h3jqsXF17imsIpD59JDw27d13H6DR3kTzbbWkN3Ky PkpKJm96xVSMVUo3jBiommJWf2tPDHhjTtI5VADZyb5cWmqfinWkT9l++UJWp3Zd eJ/rzHGvrFXBdTTUtQbweMAd5TGFieYjMgPL0KErOZhwhT42b182pxE2WzrAa9FI NRB54UbMqAX0OrIyIVIL4A== Extension name: 3u7um1 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/158B8ADEE87148AF

http://decryptor.cc/158B8ADEE87148AF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3e691b6417a17b9a954e2006414d374a412360df42a152bc8a256ebc49b236f.exe
    "C:\Users\Admin\AppData\Local\Temp\a3e691b6417a17b9a954e2006414d374a412360df42a152bc8a256ebc49b236f.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1768
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:872
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\users\admin\appdata\local\microsoft\clr_v4.0\usagelogs\powershell.exe.log
      MD5

      5d574dc518025fad52b7886c1bff0e13

      SHA1

      68217a5f9e9a64ca8fed9eefa4171786a8f9f8f7

      SHA256

      755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2

      SHA512

      21de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13

    • memory/1768-119-0x000001568DCC0000-0x000001568DCE2000-memory.dmp
      Filesize

      136KB

    • memory/1768-122-0x00000156A6000000-0x00000156A6076000-memory.dmp
      Filesize

      472KB

    • memory/1768-129-0x000001568C000000-0x000001568C002000-memory.dmp
      Filesize

      8KB

    • memory/1768-130-0x000001568C003000-0x000001568C005000-memory.dmp
      Filesize

      8KB