Analysis

  • max time kernel
    154s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 02:13

General

  • Target

    3f62801a5d4efd7d14d2358665f3999d23acd4298849a80b9831c61e99008c6d.exe

  • Size

    164KB

  • MD5

    0c31b58d5af03e17c87cc0a74ad69c1e

  • SHA1

    8d5da365d44a34108eba309b7ae86e665b9ec647

  • SHA256

    3f62801a5d4efd7d14d2358665f3999d23acd4298849a80b9831c61e99008c6d

  • SHA512

    398b914e3bba76e81c3c33440917edaec4ec4a5c34d3f97835fc9af68220d70ce5a3137190e1fa4d3699170cdddf34fd2625d99450d51e7fde8a01552449aed4

Score
10/10

Malware Config

Extracted

Path

C:\q5o4srd8s-readme.txt

Family

ryuk

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension q5o4srd8s. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread Pay attention to that: "How Much Data Is Decrypted with a Ransomware Decryptor? In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. " Now you have a guarantee that your files will be returned 100 %. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CEC714A652AF73C9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/CEC714A652AF73C9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: CcoqbmCP1KQP9KGVJYH1a3QaON8Bak2AbQB2cEO0bxIBkQgxsdN5nLJPMsVov8iE c9Y8nPXd5gu8h3vOe1EV35fIG/zOsWH64dnwCLhuyve28JCFc1bhXoOH1K5S0uBR J4Fu6O/2BChZSRqZqyuORaFs1dw7BPeNEMnEJUE3ZEf4V/grgzvZT2REB1mhb9UW /oPlbf7EbBuUiWYMl/GkazUMhBfpnezSP71fwhYmIQR81U+JQFPPmOfIIQ0CEcjK dkaLfdgm2o7pOmFKCL4omOb4HryrgKI+m4fw73TWgAHdDregCcemGpU+H0518NYR FfmLTJKIlWnqJEDfvk1pwFBzZvdvsuWUnOkocFNC4GrSpDeyxeWbsVL9nELgy8PE pKUtGIZi7sf3eOelx84E+Yra8grdxRjxXl8EoAeuYf2dwlaB0Hgp5aK+YnoMS1I9 Cgq25U2qeTcr4cxalEWNRO7fuLxaOxkoutwreg+9n4dWTtYVEqgqkkf8vEFBROB6 nIpJddWflrvdSn08nFkYpmJdfXqPwU/P0b5dxuqfC3tiSd+okaC65uBhnmAEgg3f zNvvX2eugWYofQx6d7EMola3Uq1XFtsoupQQWY34B7ItvbgiF2T9DFpMx0E7Mxqr WFsFaOJHZIxynSWZ/aflI5d80kRQ9VjK/2aGoHTbEkvq1+X6PJZGeBZ5e2K2Mdux 3TulN68GjZQKpFGWEJPrKnmfGGBNYa4ZbVbhMAgWhWZO45IdLrr1z1DAipQSWoXB TPxi4ZaP6vpnkr4DE9+b99QV1Hqb+0X9jxekUegeO9TYGvIUi/SXTkocrz+cPdWE 2VubGaDKLN2gwhaO1OEpA83Q0h2JFNcy1dfD+7KCIBVPGS+q3y5PEzpWlcP6FjY+ clGnxwUd3FboJXfOQHJeBwu/wG/8jmgnIf1ko4eiQYZrKLNV2uF2Eeyb/RM1pbE5 ES/QfkyXNuIXQf2qT6bGgtlHFFZDqBx3HzOMiLvk3M+SqSj3BVWpjDop2ObAhqYE sxi1fQdgHZb3qimcZmeKA7eSKCbf3DXmrP5B+fWSYJtt//5gxJ71cP4jrCgbVD7R 0XkcKERdAOpQaUk5sMsxzUBxts3rA1X9MLvzBVcmgy/314+/dmrDN4GjgRC/uuj9 0woeh3BJSkx9sQ== Extension name: q5o4srd8s ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CEC714A652AF73C9

http://decryptor.top/CEC714A652AF73C9

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f62801a5d4efd7d14d2358665f3999d23acd4298849a80b9831c61e99008c6d.exe
    "C:\Users\Admin\AppData\Local\Temp\3f62801a5d4efd7d14d2358665f3999d23acd4298849a80b9831c61e99008c6d.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:516
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:552
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/516-55-0x000007FEFC0E1000-0x000007FEFC0E3000-memory.dmp

      Filesize

      8KB

    • memory/516-57-0x0000000001FC0000-0x0000000001FC2000-memory.dmp

      Filesize

      8KB

    • memory/516-58-0x0000000001FC2000-0x0000000001FC4000-memory.dmp

      Filesize

      8KB

    • memory/516-59-0x0000000001FC4000-0x0000000001FC7000-memory.dmp

      Filesize

      12KB

    • memory/516-56-0x000007FEF3360000-0x000007FEF3EBD000-memory.dmp

      Filesize

      11.4MB

    • memory/516-60-0x000000001B700000-0x000000001B9FF000-memory.dmp

      Filesize

      3.0MB

    • memory/516-61-0x0000000001FCB000-0x0000000001FEA000-memory.dmp

      Filesize

      124KB

    • memory/1796-54-0x0000000075531000-0x0000000075533000-memory.dmp

      Filesize

      8KB