Analysis

  • max time kernel
    169s
  • max time network
    168s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:26

General

  • Target

    a28e23ad4033341694551d6f59737138de9f1997384da5ae9a1642cc8c9e237f.exe

  • Size

    116KB

  • MD5

    2894ecbd12a791cbf7404febb43b5f4e

  • SHA1

    8ed5327cf869893d6099df145c49aec08c86faa6

  • SHA256

    a28e23ad4033341694551d6f59737138de9f1997384da5ae9a1642cc8c9e237f

  • SHA512

    8b7a9ab31b4ff2f37d772308db28717947624d172b5b23e9979623e3cf03fa109480f83aa9243fa9ecf7d2fb7a7cc4deb5899b5f462d0c911bee3dab3e4b6115

Malware Config

Extracted

Path

C:\oeyq480-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension oeyq480. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/01DF7CB2D6981761 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/01DF7CB2D6981761 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ImQC+yEupqrO7QcXMODll834qB/rSpGfPjIgsZ6VmiFA9GioLcJrv0BHxLBTrgG0 JWdjF+4NZSLvkdMYO2RZj1MIydekRZCxo6oVq7VauZQs+fu92zKLVM/hJtGyW8B9 lqdHLB7g4V/huAfx54NqKwv5i0fPD4Lx+SqfJIGWmwjv3by2EjKmMnLqpbGEcDiq Rrwbwwu4Kf05BAywEDyqCVlZlSWTLdTIlV4N8KR9CtU6wfCeSLAcaMG05oPAhhne 0n9jb9V34Mj0y0LjrH0YpL/CQ4HvI7OK71UTPLnMymEfWmeO+XboAZrWYKgdJF9E xbnb91dAx+iJyuHXs9eDXy6JsdkIf7VP8dFT9Y5I0NrktgZ44ENAXSWGkHcTgk67 HvDsi3iHQyN3rlHrYlkt2rZh73Gtui4ebhxv6yz1V0xnG2JfauLTPmdL+O9D/peD nukbL4fCXHKzFtFiNxwE58TvDypCu4fy3fDfUvbKIAqfDsqKbWUg+iqyIXWBvVAl LnJ5rrxPOXJ1M0mtcIwDGSabd7yG5p7IzbzB5xwcMCuUoZHfXldLn3E/tA6UE7YC Qfdcan9mULSGnPyXKhWbcI8r4x6oc7ZyAE/AYEQWFUUfMK+Yrrz901BlOrTH7l/k X8FSjwDa2Fct9w2oBilPB7ht0ZBx0kvSJRwM169AYDiZICEiF0cUI71Q3OY5uqU+ jyu4UAvBpx7UPbWDkbdBFm81rJ9TPSMGtVK5WZ5LTzzkgInfyBrZLVTn4cCdMaBX ahBTWI8ii3DAqZk9X/I6YSRCBCfmAw+ELcvwuAXcEOGxLdjfQQWAqXW6J23lvQKf arOF1n970p8LAKYDcfy58ksIFbJIy3T8rKk/wLcaTGmdvYAO+JInMmEnmE45D8g4 VJehKin3qE5L0aB3dneBOOm6PKl7CQfKZLGZslzGEVbu7rqg4o9dD/KkH6oCiDeJ 4Glo6BUSBaRQJgdQzGEIqfVVM2WkQAPmkNYf6jdJcpZKzlT+TWmag8o1mDAmgCN8 dCUmNWVQ4wfpwndGsUz3qHR8WfWwCDD8SKVkJoaDtaYmp9ypcUsWEAscgCqVzC0t WjY07hBQsElp0JxNEstT/5hnfEN1ymmBHiQjEsrHiXX9MHbYyVxNj3lZ9Gh/YzZ9 vQ+M0AgBH+NXzi0u6rYo2RppeAsG67Ta0O2ZlkSpT6KzEeoTyac2/69UXnkmf/EQ xIELWMKetQ4AULOqK/5tOhXCJGGGI2a7z9L4WrnrP9OZAgSm3USv91VqD84wFDf2 Ug6b58pFlWedQs35+LtALq4q ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/01DF7CB2D6981761

http://decryptor.cc/01DF7CB2D6981761

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies Installed Components in the registry 2 TTPs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 35 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a28e23ad4033341694551d6f59737138de9f1997384da5ae9a1642cc8c9e237f.exe
    "C:\Users\Admin\AppData\Local\Temp\a28e23ad4033341694551d6f59737138de9f1997384da5ae9a1642cc8c9e237f.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2420
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:816
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3040 -s 6924
      1⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2408
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:300

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000001.db.oeyq480
      MD5

      03e41e561f637351e0a9cdb71e55fcaa

      SHA1

      c567f108dd787b91c473217cf7ebb42b0b415078

      SHA256

      2f2acc75e217432d44e4c2ef910b43c9aed1e61db238ffe1c0e038ea67742498

      SHA512

      f8d27c2f3265338f837492f95adc59e237898277110e493e7bd53d5a10cef510975ef6dca7b75e1d3f5f34899f824f4593067cd25a1b13c16f8f5ebb9f617294

    • C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.oeyq480
      MD5

      7e5ee4e6d6e1a9a317454dcb8366e202

      SHA1

      63f13e6313d162649077cf5eebc4a3183011724e

      SHA256

      ca1b136c9b6971c1579bc9876c9b4b144663856d7ecc98bf5affbf6d0cbbf4c2

      SHA512

      a4dc5b365f5794107ad52f4073c37e6c07653e91d7b40260f9a11864029ef3a98a71858621167677c55766cecc20b32a0c542845e548c2db11039e9152360019

    • memory/1268-122-0x000001DFA9620000-0x000001DFA9642000-memory.dmp
      Filesize

      136KB

    • memory/1268-125-0x000001DFC19A0000-0x000001DFC1A16000-memory.dmp
      Filesize

      472KB

    • memory/1268-137-0x000001DFA9680000-0x000001DFC1820000-memory.dmp
      Filesize

      385.6MB