Analysis

  • max time kernel
    164s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 02:23

General

  • Target

    2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe

  • Size

    206KB

  • MD5

    0220e281b135f0e32a2794fefe4e6aa9

  • SHA1

    05227068220cc142487806cddb262561a84e7538

  • SHA256

    2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b

  • SHA512

    8e4d475bbea73f16d72079d329968aab1de73cf376f1a5988e7c5edd7824b23b29b8cb878da25e366fa98b69a4fe9fff30e912ad80172f51bab7c1bf0c008538

Malware Config

Extracted

Path

C:\41n10w-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 41n10w. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/73B88515419F2565 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/73B88515419F2565 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: BiTzWNK2xFj1cXIbqVkcVXMlIOR1SbAokcpyZ9h6TujDxVL3YDE/1oEJguszh0bF WEVL53IuvxxFMJU8Z3BhITofqf2dI9H9XcJXgXewhqTy4Z5DJTv/KQf75UYjAbkZ k2IJeIKJIecbxNE4PBycvPAfyPHpNkammngbux8wFlxXbFCs5KTcbv1DKcz2qrLu gmObsLwx3bwhO/sDUoBc/cqNqeN1fps5qJuALYAugaM9Ew8ilHqTNY6OHX7Ztsyi dlL5Jh37sMRxInqdSj61zj2kqEEI3gSLxB/JKqhZ0q29NFsYTBzrjXh+9ZsWTEMz UAwj9EM0E6YccY7UxyBCQfOzZAD9GLCL5QiSrUEShGo+Z4GVJmtV6++pRAY7HToX dDpmB4g2sBqYJMrf3DdYhjPU8W37junrp1l/GcT3DnhVQu2zPJfIm9kUxnaB+EdX ZlbDjyH4qIIJPhnUPu0lca/oZeARtEje/kL8706IfZ3zJymJ42NlVS3p3Cyn+mEs GsX76eJ6iuxJPRGbiIcqVVe14jSZfp2Ap58qIZILB3AEyd1jp2f8URMZJ4cgk6kW FSsosi6NxPtsbz1qPtBlUuVpqiXBAdDoS+wzi7iT/DH29HcdhMDuxypnDHN2Mxrc Pt72+kJbGahIdzYkqVRT0nJbQbJ1Eyh3wIU8Fvq1uBov2+WAjawIxe2F6lrlh3UI N5+WQ9GRqbXKEjPm8zciNsL+dKm5/iYRoTjk+nuIX0TpdSJkzIDcO2c7CjARrJnd /SRw9KcB1IOHlmbG0cJ3q/XQsR2Oc/clHlfGNBH/D7KjgJHZGdSaHogOVbxyzzoI OAo7GsVtcSM69pavCHUAm03WSnieGSfi8UPUfTXrnUnKKSoVjv7CVkmjpMs0ci7D X+L0TSYcsJ9oWGaFnCnLlBRGAsKiwneBqDt83NItn8uV75midez4qVDnCsSqy60C NiLNh9EdYgc6Gme+WoepOIS21fU8N7WljOSq+8QiToDRsJfHqZrSjZgQZuy3HTw7 tRA7gEAy5Q9NSiK7ALMyqLYgyPFgfzUTVJK3Frv//VP69jSXstDnw41OVmycIKBW 6VfTMXObYDNdjJyjV2jzeQCvMbOx6B6w7JhXveiqc3IAaxxbf+fXsJo5dHRpQd+D cfcKXQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/73B88515419F2565

http://decryptor.cc/73B88515419F2565

Extracted

Family

sodinokibi

Botnet

16

Campaign

2932

C2

premier-iowa.com

turing.academy

physio-lang.de

rarefoods.ro

palmecophilippines.com

ddmgen.com

omnicademy.com

baita.ac

cmascd.com

nationnewsroom.com

belofloripa.be

babysitting-hk.helpergo.co

tages-geldvergleich.de

iactechnologies.net

line-x.co.uk

richardiv.com

goeppinger-teppichreinigung.de

dinecorp.com

hawthornsretirement.co.uk

kerstliedjeszingen.nl

Attributes
  • net

    false

  • pid

    16

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    2932

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
    "C:\Users\Admin\AppData\Local\Temp\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:304
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1620
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1852

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
      MD5

      ff6818d770e34c64c37e6a83a7b24be5

      SHA1

      8af7c387cb323c180fd9c4fde99572a0af8fb228

      SHA256

      47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c

      SHA512

      b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63

    • C:\Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
      MD5

      ff6818d770e34c64c37e6a83a7b24be5

      SHA1

      8af7c387cb323c180fd9c4fde99572a0af8fb228

      SHA256

      47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c

      SHA512

      b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
      MD5

      ff6818d770e34c64c37e6a83a7b24be5

      SHA1

      8af7c387cb323c180fd9c4fde99572a0af8fb228

      SHA256

      47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c

      SHA512

      b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63

    • \Users\Admin\AppData\Local\Temp\3582-490\2809a1b475ef2118a5f6be8320f2015744bb5ce890241049c0055f9f2a3d373b.exe
      MD5

      ff6818d770e34c64c37e6a83a7b24be5

      SHA1

      8af7c387cb323c180fd9c4fde99572a0af8fb228

      SHA256

      47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c

      SHA512

      b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63

    • memory/304-62-0x0000000002522000-0x0000000002524000-memory.dmp
      Filesize

      8KB

    • memory/304-63-0x0000000002524000-0x0000000002527000-memory.dmp
      Filesize

      12KB

    • memory/304-60-0x000007FEF3460000-0x000007FEF3FBD000-memory.dmp
      Filesize

      11.4MB

    • memory/304-64-0x000000001B7B0000-0x000000001BAAF000-memory.dmp
      Filesize

      3.0MB

    • memory/304-65-0x000000000252B000-0x000000000254A000-memory.dmp
      Filesize

      124KB

    • memory/304-61-0x0000000002520000-0x0000000002522000-memory.dmp
      Filesize

      8KB

    • memory/304-59-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmp
      Filesize

      8KB

    • memory/1848-54-0x0000000075891000-0x0000000075893000-memory.dmp
      Filesize

      8KB