Analysis

  • max time kernel
    169s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:15

General

  • Target

    3b8539782f2006aef9a22bdf6dddf8a7a8d203003200150b93f514568600a513.exe

  • Size

    155KB

  • MD5

    ee48310e87a175b91eac5974bb4f9f12

  • SHA1

    dc4c1accedd03691a4bd43fc0e693258f4288911

  • SHA256

    3b8539782f2006aef9a22bdf6dddf8a7a8d203003200150b93f514568600a513

  • SHA512

    8bb6bfcb568af9042c6951df8a5ffc6b4632739ce3b53bb89a2c443be9340c7f4fec35cb09e4e25dc0b86ce7d983078cf67eda91f55770f66914ff71486b5d8c

Malware Config

Extracted

Path

C:\44a13d8d24-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 44a13d8d24. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7059D75ADD1BDCCA 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7059D75ADD1BDCCA Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: bR75i2MttFLbpMj5R+55Hvy8trO6icVjePWBHXMsqFOXP1qHR13wtguWwpJFC3W6 ilqTTylWYUwDgfMiV6qFGwXSoBQB7o8yqETm+8+1XUvDv8Rtr54dG7TJqQ3oXcR5 mggv40fAOiNxCqFMIE5s1ylBhyDMsyAh2vJffBSFQLKC9tiI7Ycdf04SLRzGioz8 rneorpM/kVGbmQk3g+3BhMdSEfbt2CbZqquEB6fhigZNpb0ZRzBv80yxLmNIaow8 8pGa//7W0vh8k+lYL1b3MNg0qjbLojtDzDXGnKkpn5nZKSqQrewbROOll036+mJG S/OboScVGHibLeU32njlgdIqTKH7CS3jciPvKD9HodjdcyJmK3295XbtrXlAQviH NNoiQe8D7c/KjqaJvtfxYYPYVWnGprzRhjBg60hbsIpaBIa7DLusW0kR9X9lJiGY iwRsM6VBTpIPg2DNli8PSoyEPxla7X1J2lnoBqRq7SlHsIbxgPtBdz/I/EytO8Ej UeQWtTUVH0jKPvwHbO9WlC0rTRYNzxIBG5epXuenCd2sSLXulR6pXvYdXoguDIdz A2dDoYnd8gI/GM9bK1AQVTSVjmy5iNE98idxwbRnRRunIOIPgsINYhBwTScEejjm j89pVYIbOuuk3yUOVlYT/mI/GXWdbAe39DJ2lb4gMFPc1B08cg3JiDWQ6chLHfEN xM56WwzJpElT7k7UZPWafJYuxRks5Pevb4+QDjmPzyaxfDpB8U6zrUWt0Scg1gds lRAUMuOGfzc0azOymqDDmVALbxw/IcfWRM7Fu4sJ6gwJkCd3nvNKiZEx8Jo2uL+t 9qPPlTvcgn4R5tSL6oE29+vatLf0R67KMIe4AUEjp8R97eJgHFxVshf5P+zgNswb yidt+F5ysXGANOFMpY6/AM2WOUAcy+Ygu2o9do14jSKUTtGrVOO/dZQL7hQ4PVH5 GlDp3sYB9GKHLeSaJFDyg7o/6kPSOsQnuM8ClXLBXgF7mGSo9keuBXgMBlYerq/B g0+tQIQHCp+uuc+3oXgLcJXNWfE4jvbgPlBLmxruOuDDYko4nTLWa81kU6K2K1e7 kzVPIUOiWViPi53TrgEpIA7FOKGnfXGqYmPAv0aKEfP5Extm50wmauqiFZLbj8Q5 XIEv0TjsIC8Jfbl2vBeisNWEibA5md6RarzN6b14ElUggogXAmNQ2TYTwgsC65wg SOBKGFsC4f3pSVf2DV9vudp/oDqbSZ5t1D92o+xW+8tUQ+zF6J7Er9iXZJuCSZce p8cQasWCXmv/oWnLl8OAUlZDF+tSoFeg Extension name: 44a13d8d24 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7059D75ADD1BDCCA

http://decryptor.cc/7059D75ADD1BDCCA

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b8539782f2006aef9a22bdf6dddf8a7a8d203003200150b93f514568600a513.exe
    "C:\Users\Admin\AppData\Local\Temp\3b8539782f2006aef9a22bdf6dddf8a7a8d203003200150b93f514568600a513.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1536
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1484

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1292-123-0x000001DE28970000-0x000001DE28992000-memory.dmp
      Filesize

      136KB

    • memory/1292-127-0x000001DE42CB0000-0x000001DE42D26000-memory.dmp
      Filesize

      472KB

    • memory/1292-138-0x000001DE289E0000-0x000001DE40BE0000-memory.dmp
      Filesize

      386.0MB

    • memory/1292-140-0x000001DE289E0000-0x000001DE40BE0000-memory.dmp
      Filesize

      386.0MB