Analysis

  • max time kernel
    175s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:25

General

  • Target

    a3df8d9e4d5a3f9badf2fb138dc22afc7bc968c0d1fc8a053d77a790755038b8.exe

  • Size

    172KB

  • MD5

    b3f6ccde76375cbec480de2b81253427

  • SHA1

    dafb09fa55a3d32e8e518b3ba74da0ad4ae93df4

  • SHA256

    a3df8d9e4d5a3f9badf2fb138dc22afc7bc968c0d1fc8a053d77a790755038b8

  • SHA512

    f129584ae8898852784f4c3978b4441ebed2469a0115f375f659136a95eb1302db627ff2b4e55621095db19ea5a494f63afeb0ba423fac074e389546887ecfeb

Malware Config

Extracted

Path

C:\21r5oq9o-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 21r5oq9o. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4F055BE8C60315FA 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/4F055BE8C60315FA Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NpmvWiIvnkOoVTvZnffvStD2y2DRKbx6XocoPpMVHnwlQsBp2U+t61ky3ocoV9H1 LEj8wt44V/aF68rKF5BebREI4WGAE3JkBPiJqV64ZYcpBr1VmHJvPPivjU3Kp82L TSDM3rGC9RLfcnkK9/G0bbdXmIfbFIUCI5OavMIx0B1picSrliTLrxhrvMtu+pWc eWprBTrmrD3/acJpXEUvq+dzTN9KaHz9Pt9r/I4QVoIPt5avEp9elh3PMa8l4am+ Ny1uahrF7eCn2/bxQl23tYQZk50AsAVeHtWqf+Y++o37ivqEb9+peVF0/A8baGdL 8NCS0iyo55KpDD/fIJI8daL8i102+V4Gl4xbF50di83GoCIBXHTjMySWBC8wfuQN egdFq1lZmzYisZB9Kh1RoWJxftU71SHDkWGpKJvr7eDwuR8vkqjTxHzVQFkUXGeS BpFqiN4+MYGmM0YSMib4wlQiay8L2bf9ouBxwFy2FgD64WpvKF4EJ8A5/gC46bRu KgCvbGZ5Lztu6kav5bSf76Lid0Jtn+4kBku/NhJfetIGy6UeeL0vHyFup1+UubQ+ dPffjwVEXdr5bRNVonIsWyy3K+IeXxT6plDxu2lflp6kq3YS+iisrjJuoQI4YnOX Gf2Qx14khQ8qzWjXqDHVopKKNZGYflpCiLrg5GwDGBFHx4qESBn9F5KWnrxDeQMe rQm7vkiWQw0PEEzRQnXfPbCo2xhQSFzPINzUhJafZ69MoYdLgdibk3R4Wy2d6Kif wpaD67iOQ4bMKVl0s7cpYitBm1cJJCoRUIifChpYPHdhYw7p864EQ7nGE/Q1Qgif 2l+q9zHRS/9kQCD87JHUNaPS9GP7vWUHPaG3zVi/Y3ZyjRxACbiceIFQX8yADagr QARnGfEAyPXOSl2LybpviTmo8GTit9QlhrgtyIGFJvUduMKJ0zP3E2WpUg3Jm2ST p2/uRWZihDlw4zC1vySjiZ2bnY+PI2ygHj5PjlusdBPfnQ+6oYO2vrGM+tlmwGqU GSNFgI6yDTGnRfb/6o3eFBo2BDz1NvjNuqMWe4SpYV8TY2MDfs1zcELIBNPs5HJW PbSnAQY1zLNsDgoVCshLNE2ItXfs4gebyy534VlneX5cfeTwA6c8sA1UCWKg5zlV IRaSv49LfzrbGnszLfbyx7rTcqpBDynv+rPdNzwFqD1KDRaNbV0NXDQxzMLhbWbG YwNsChyxGmNiw26aQHsHWZ9Q6EkdQ5+bUUh3P2AIoCduQEvsUuchMjO7A+HRS6h5 GVVGo40i4K/mdBJ+1E5U1nasJBI= Extension name: 21r5oq9o ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4F055BE8C60315FA

http://decryptor.cc/4F055BE8C60315FA

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3df8d9e4d5a3f9badf2fb138dc22afc7bc968c0d1fc8a053d77a790755038b8.exe
    "C:\Users\Admin\AppData\Local\Temp\a3df8d9e4d5a3f9badf2fb138dc22afc7bc968c0d1fc8a053d77a790755038b8.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1264
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2452
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2716

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1264-123-0x000001E730B30000-0x000001E730B52000-memory.dmp
      Filesize

      136KB

    • memory/1264-127-0x000001E731EE0000-0x000001E731F56000-memory.dmp
      Filesize

      472KB

    • memory/1264-138-0x000001E718A30000-0x000001E730B90000-memory.dmp
      Filesize

      385.4MB

    • memory/1264-140-0x000001E718A30000-0x000001E730B90000-memory.dmp
      Filesize

      385.4MB