Analysis

  • max time kernel
    4294195s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    05-03-2022 16:01

General

  • Target

    117f128807504f387d0b8e174ada23238c3556c7284a598ed25790dc2d9b7301.exe

  • Size

    117KB

  • MD5

    92bd5043b057192ea0153c98da1adebf

  • SHA1

    0444bb2621ed073ced634e1916204dff5fc6a186

  • SHA256

    117f128807504f387d0b8e174ada23238c3556c7284a598ed25790dc2d9b7301

  • SHA512

    3c4c2026d9306cb25699b7dd7d1e6e2e0f97b5f228b49bdfd25e8b4cd68645eb3df2a6a84506b6da1937ab7e1269057ce9ae2e0be68c4c088dd753a733e19170

Score
10/10

Malware Config

Extracted

Path

C:\k2z75gsit-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension k2z75gsit. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9DB5DC3573DA04D8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/9DB5DC3573DA04D8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: AsnDVqkgh+zxt/igIAmV8e4VRoHpSrEqgAaEqMcZHekr3tOPup0EohAjmsRYg+ww VcJVkTXq1VJVpNTC3DaYAftP7eAeyxnG07dzgDGCqWG71RkC466sMKC1AthBzvsB NcAqZPXLqAOM9GqPx+TplutGPEEH6q2rmuGBVMzNGXJmtoxo4hw8LFWiD1uLLmB4 PgNcYt75/ZCgEV55o+35snT2Ep5iNTcy8Y32Z321NJvQ7pYb+1K9xqnX/sgTWnlw v2GvIf/BJ7SAgdC1ljvSwF3Ndt/D638up/vLA3tNDlWOsBsoxIVP9mMs3lxVzdoT LBT6Tqbv/zqQcSPkgCifM7VvDzduY2fGWWxP6pQJtz3NimbeybrAgHsnEXZTSrR2 eFlycIKsjy/dEIP4yLWqzx0sNgWZD028zhgs+0FB09jcsrqqvNYMh9/cyLYvA1SP 83WBXAkN6zoaJj5iW2jk7LDues+t7AKHFBSr1ybegmp+VpD1EkeADNM8Sdo19KFC dzojsZ3rVl71l+vWf+ODIuQOAZ0QYBwEmuYanuVnXGxngbrNLNcV7cOaKpqUahM/ YYgvI97xz2OIn+5hM+d+P55Pc4dlo6dBX9MSwPuBTUPQRsq0rQy+DdSLVZgYwTS5 q9+XFG0phY7HVqx60OIRiDOh4KNyRFlEYHS84wTjx5GDZEc5yMV584WMy55QgDct vVJH3p0DQwivVTAYi6tVT2SGb/hC4JM4hIp3UkLx+BjjUVzPHe7FbQb48saNt/wH lPPMzTfef6GzHACxnSDSoWCMnBYy4USwrbecRv3+W56uBeXph/V/nVrsZMqAvH1m 1CHdgCm9ZrF+100TsZ2ZVGDiTHtRFNoAZJTFq/hvgZ2E0n8w2mHI1NxSTUYLCht9 +jPutndWhcMY2nUF4fE4o0cmWnZ/BzcuqIe++oPVGqdbBn4LHwZ0EfrGxgoc6Pi9 9QBq+5P7jGE8jS/paniqDuOvUOKu3xc4b0miaAPUGXChmom+7jlH3qrLCPlMM6rl mlvibzJ5o0oTgvms7OyCOsI1Drio1qrRhrNl1t4yFRzF11OGEAOdHaqWohSM8ibL 2oz9ZNbpXXFhcH8dIu6hfkWMnsN2Dmh24S6vpKBSl1BAbfJgwstMSgFlxLSeZd4I klnbvAOu16TvGUJ3ZeGrPH9RdxrSRczX7zJw0QlMDQscve0UzWZVxVA0dtmDkNgY MlDxwaX1LikEACOhVMAo7YeRZDt+oy2Dw5zj2QGAepfKfBxydMI8byO9XLFvm3sc hSW3mwKJ+NL9eu8QL6taMN1cYvX2ld8LG/dqiq4G ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9DB5DC3573DA04D8

http://decryptor.cc/9DB5DC3573DA04D8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\117f128807504f387d0b8e174ada23238c3556c7284a598ed25790dc2d9b7301.exe
    "C:\Users\Admin\AppData\Local\Temp\117f128807504f387d0b8e174ada23238c3556c7284a598ed25790dc2d9b7301.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1940
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:912
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:620

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1940-54-0x0000000076271000-0x0000000076273000-memory.dmp
      Filesize

      8KB