Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:02

General

  • Target

    585a0bdb8575d5f7426840d71b9c6081e37fcbdbc04135cc15749e30268572ab.exe

  • Size

    164KB

  • MD5

    777589bebd9755259639db210e619e50

  • SHA1

    b48e42718b55e072ab5e0c81855cacf13a593bb7

  • SHA256

    585a0bdb8575d5f7426840d71b9c6081e37fcbdbc04135cc15749e30268572ab

  • SHA512

    2f9b0942e41552c6964d1b69cb2bd2b3aa1a9a0ee55aaa2d11a6044f96a01f6d3cb6a559763a865ca4be1bc78011595d5081f637f005f6b8954f16effab0b82f

Score
10/10

Malware Config

Extracted

Path

C:\4pah4v-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 4pah4v. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CF3DA93402A8C490 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/CF3DA93402A8C490 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: FlmOxfSlNXunmnFIAwaUEP/ZPZ2HiNqPtBkZFjfW+VPKFotFSY3L4JQtbpBniJ5E +je60mhH7bbcWCsj5AzICGo0vyLmprdTUXGQo8P56gblxpIwdEXZMihJpjt6Vz3D 0LDtb8BV8a/sUeuxG+IQCwEWWDn0dbTIaQsH3a6/M5blbxWkXqHmY9aFF5CDJ0Z5 IEY6k7PXqfJTrIL4paEENgK+H++hQUotLpXcenKkFVdYxifEsLuYwXD1G+lF8yIe vCH7krBV6rSOS8v437hQO+Z4/58J8PBae1rf9wZKj6KkBDwZZsukoMZpfjr89hY4 JoomBBkPf194Kq/9/ZzjuvoPdkXvFtPMQE/TroqFJvlr1Iqf4knQ3xMdpudUJYT2 szZQDfIatoo1LtoHNYHeBDbQ5nNrP6p6IYTrxtL38IlBcWqIcAsjZd6ZZinB06Lh ZXGsk1TDiVUVJvyDdNGIbW3j4/f2jAPUlNNLheanDTtMiqeCVSPwwUNiN1OQy7zB s4+T3Ed2gDN1erlcXQEAtYy3uRVd2qclm7KxP7D/wV5VQ7DEZEI2EGp7GlQAvE3B 26CdxVxrgZKUBLkcms+YxFH+SoKyJJHzZN6fewELYl8Gl9wHgwtIxt/70YgkDkoh EvBcxiXsZdG1vbvPG6NGDU5YgiMDrnjCvijdilr9Ko2DgpFdHSt2gf5N68Msbu0a EILokva8wX+dWKOWQcAjPIkahZ8AHbvoo/wiu7KCBu9Nult1YUk/R6EQ2QvGplor otul81OB2IU+tUlkJwhONX8Y0LKo+RR0k/w7lmpvowzUM+w2yLwK9yMZnaJnSKeM evJwISPbJ1i1pVgCQuJfzVsXvRcgL0YC8vLDNHP5eMA1nn3b+iSFSQQ7T1c9RH5z WM9L1YLFvo40CKSZrIsiiqBcXvjdpdyUh9ZBC//QnZ8d6Eut9oozdFqXAxqWt/OQ sactglZjZT4+qilpa5LNNqrJ39KeubgPfVKcz8yzJKbmq51KNjx/jiItLhBoUd86 +08yXzz/XC2SKt4FLNW69a6SBvVDU3W6IMJgXIGu6duQe8w1dHiFSe4tGVbVgxPg ni9+uGUjHFQ3PWxowhak97soEycDZn4ETy3yjdyTzkzMh5iXmDLfCA== Extension name: 4pah4v ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CF3DA93402A8C490

http://decryptor.top/CF3DA93402A8C490

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\585a0bdb8575d5f7426840d71b9c6081e37fcbdbc04135cc15749e30268572ab.exe
    "C:\Users\Admin\AppData\Local\Temp\585a0bdb8575d5f7426840d71b9c6081e37fcbdbc04135cc15749e30268572ab.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3416
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1332
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3416-122-0x000001FBE8B50000-0x000001FBE8B72000-memory.dmp
      Filesize

      136KB

    • memory/3416-126-0x000001FBE8BE0000-0x000001FBE8BE2000-memory.dmp
      Filesize

      8KB

    • memory/3416-125-0x000001FBE8E70000-0x000001FBE8EE6000-memory.dmp
      Filesize

      472KB

    • memory/3416-127-0x000001FBE8BE3000-0x000001FBE8BE5000-memory.dmp
      Filesize

      8KB