Analysis

  • max time kernel
    173s
  • max time network
    182s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 08:01

General

  • Target

    147b098aabc3a9744c64dc48ea8ddff09a524112b5c4ec87815b2b964ca8c78b.exe

  • Size

    150KB

  • MD5

    a37c84998bba38feb018560d11c04d25

  • SHA1

    49f78543385096b7833f8fb6322ad7f07586f47c

  • SHA256

    147b098aabc3a9744c64dc48ea8ddff09a524112b5c4ec87815b2b964ca8c78b

  • SHA512

    951d8260201b06a04b5cf069010a8887859c9533267fd2044ad1ac6e46de524b6ba6ad10bedddf2e45e3520c93836ed98a942f8c336281dc687391187dc5da7d

Malware Config

Extracted

Path

C:\c7h8j641-readme.txt

Ransom Note
---=== Welcome. Again. ===--- We strongly encourage You to pay your attention to this message and read it to the end. All Your files are encrypted, and currently unavailable, now all files on your system has extension c7h8j641 Before that, all of your most important personal and business files were backed up to our secure offline storage. We took them for temporary storage - but we don't need your files and we are not personally interested in your business. Our encryption algorithm is the most technically difficult and max resistant to burglary. Only OUR specialists can decrypted your files without loss(!) Any attempts to decrypt files on your own lead to damage them beyond repair(!) Best way to you will be consent to negotiations and mutual agreement between us. To connect us you need to download TOR browser and follow the link to begin negotiations.(You can find full instructions below.) We are waiting You and ready to listen all your offers and discuss them. If You will ignore this letter - we will have to sell closed auction all yours private files, photoes, business correspondence, documents and business files + with our analysis of your work activity (weakness of your business, financial violations and the opportunity to profit from this information). It will offset our financial losses. Or we'll just put all your files in the public domain, where everyone can download and use them as they wish. * For TOR Browser http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ We are known as "Sodinokibi (REvil) Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread You have a guarantee that your files will be returned 100 %. And remember, this is only business, nothing personal.. We have a concept of business honor, and we can promise something if we come to a mutual agreement: 1. We guarantee to decrypt all your files in the shortest possible time 2. We will delete all your files and forget about your company. 3. We will show your weaknesses in your networks. .-= INSTRUCTIONS TO CONNECT =-. How to get access on website? You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6A76167B95A8FA3F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/6A76167B95A8FA3F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: L3fJFmpom6yINaXdTlj0jr1CP06DbQfsEyyS4KvrPMSmTJ/JKlKhzXREBMRjb1T4 qv36UY7Mj/g+FGt4jOplnQWxmR51VF4DWwp0Xc3qWJ58jyeZLHecQ/KZvU3D7J2U 4rvwXUBAG/cyN1zbfMIawAxewWRj6GO0xserMiSRIsFikYu1uooFjXHRlv0G6WxJ fCaztlKHQvJOnegVM5hCXglfJzahPEnV+MsSl+5qLit/pVNt/8jOO3yopXe9zcuG G24J1inJQcWMBIoSuh3VM2X2LdHTNGuBj7LEJfL1G+ZBYZK6QbUQilhZmQM5+aqa 8pMD1z420aWXEQAUCKFmSzD0Fo+AV2GxmHtpjsXQlSMXUFnZ5FWM6VjOFaFfk9Fh MRUgGKSTzmPKLgndY/1z1vEqXV+4PftA3uE0tMAG3T3WGOnBj+P4eOjBvorjwtYz 7VWqCaqTPAUuWP17uzYgJ29YwXm6yD1H+FaozQiBIDd3h30mJj3YPc7VY4z3kWPI WOOAUHLikM+l9yqgD3fz2xtgvkmLGJltYGK2xPmEojN7fNHVqTOz0MbwFZagpMzR Mc6D0BDHXVSPHbTUtpKlSoHmw5YFgORTTiMu7cGFBQW64Ns849WuDs9HfbOf6MMZ r18sWePUAvfEFpAeNA2xBsiqJlAcIQsJIIP0hvH3Ii9ZK/Xp6mD9/XtA/uIxAOoF rDooXp5eycKnVRboinA4mZ7xRMfvbqQ71EUPp7TTjR15LP5r0ibnKA4zjczvAcGK w1T/kUAvkj+CiZRmHobVpRYbB4RtwqFBtcrIS5qGmb8L3fmMoKgPe+7eDOFBOGhw ZzhwR58N40VnwMWJoreDJ0CnFXtPOM3KpZx5lUnW118AusbwDBeNE7mYwS5WBLwz 1z+GhaYh4rtp0sjm/p/HaCgOzGg6r2DUfkwbuhOnrug4g9ar5LDBjLBdKe16XrlV rD9/6QGlV4IQsN6kW08En/jLlt6zDoNfnTcad7hrj5IEhsrNxWjArESv8gyDQQ1n k3OjE95KZMWPdgMuj1Yc1i4WwxT3fYcoow4/spm4v8XBaIFb8u5C3tKbdv2AUWGt M8+YJyj9bslnmfn9IaFfjlFGy0Qwpe2s3Z+AI9uNwuGhsUMnGVHLhEoqKWdcrQo0 91E8tvK4LYIfEu3uxW67TOeSPqqBVw5wU4cQi1FGm7V27JSkpH+fC36IjeWg3XHp b7gIi75RwBmY6mLLsJuKhivY2kAicgSfDy0tyUn32qxvkGRekhJI8uY1QOKeOkhC TF/0SjvIU9tjZg== ---------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all your data!
URLs

http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6A76167B95A8FA3F

http://decoder.re/6A76167B95A8FA3F

Signatures

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\147b098aabc3a9744c64dc48ea8ddff09a524112b5c4ec87815b2b964ca8c78b.exe
    "C:\Users\Admin\AppData\Local\Temp\147b098aabc3a9744c64dc48ea8ddff09a524112b5c4ec87815b2b964ca8c78b.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
      • Drops file in Windows directory
      PID:4620
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4660
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4508

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads