Analysis

  • max time kernel
    4294184s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    05-03-2022 20:26

General

  • Target

    3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe

  • Size

    118KB

  • MD5

    c09cf0cbc98de58fb8e47dce63b5f1d5

  • SHA1

    85e72911847b77b2ada5a9e8edeb1822358486ef

  • SHA256

    3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609

  • SHA512

    7f4d0f85364b0e7cc87f8b58b692ad7b712adc90ea1824f9f6dbc7863ee28103ea1846cadca7155ed154de34bd39f455715d94b06e1a103b9a7c78c0501896da

Malware Config

Extracted

Path

C:\7a7ir1o7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 7a7ir1o7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3AE02B28AD2AD45 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F3AE02B28AD2AD45 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: e7eHnI5SY4sjOMosrDWwp750qZ5tY6VPnI5BxV9mesFhzySRoLfeeE+fj39DTO89 l1aD7ImrxoyAwDTZlQnXxzP+VkdkR0zb9N/kXGkRKxICZJCgBDGCWKTJGyqxAqKl 6x0AXbWog2EmO2Z/9ub3dTI5BPhVnyxmmlVRgpHi0QVK0DGDbakRToj/3w3aptIB A/x2OYyoLwZDOPB9aNhSq7VyS4mIPgaHoUboDEeowgIIZfAsb5J47xI8vTawIYIy F87Z8Wza0PSqzm2wkX4ZViCnu43MUhc+ODDfG06CSs6kfpA05bdvzeXyJocWR4ZG B0SvWbP/3GnInFRIXaq16XPvIiRs2EKiIf0s1ZBqgmHXtTagBoltS1GOjLu6Hn0P DRlsooMgCDMWZOBntQCWqLAAlnJFEBG64RzZtP0jPKcQ3OCSq8V24AQZjDUS4idW cLWgZbd08tyz2+NnlG+nKg8+XN2KW3V7mVop/sfpkwB/RYxXoqRVgfMpvC+7vOxc RYgBtKUx6YgwW88678van+/beXG0xwo4JbNLWorpWbnn3na0nSTDqkECOT8w1f5c CC41HHPkIUoNpX4zKtH70B9OLb1/4VzaxNVJqJHTXoUlwWro1to9qO20Gp2gvqgd QH+MuHsuv52V3Ib6aS85IJ5t+mEDL7DuaPyqNlsYsfKuBbS4Eeu7A+m6O21E9fsZ 0bYtS7QyI2BgIAxbBvdwlBYpjtuIbZHA56bQicktxi7BwOwFgAw1TO49doALCMXl CtWJ4UtIpWrvMo4fd+qG0aZBXPtTshG8cl/IFJEUGvYcSK8saNqBYd5Upp7T7ewH Jv8dTZ1r8OpU6/jX0AxHrpVLYtauULKFx++Rg0Aoz7Dv+tFHP0zojPQEREG0qUfv k/0pmbssL08gfY/JlFMhZkSfoO6vG6z78yKAAu37kFOfnMHU3OBAaMC4fqxz9M0G SZOcxEOV4IvFcH6I/9o+2TsYgDoyDRnsnq3SkfB1ugfMlVsUALoTwpHU8pJEoVa+ QV1wjS4tl1O534CFOn//4cuM5mp4Er3qNZuoGSjdUQOD3EwDaBUxT3i9iSKnokdI kIcsvXcoz0fs9ijYdbBaK9mj24/0Q0DGo4jG0RO5FGBsP56W4o6ZfFWGO3Tcd+NO pUVGStFGUNxHdEe7uO3EgcG3EP28MzRlCSLacxMyo6Qxiekt2Lc48MX9ArQSzAa0 5oBv56dWjtqZssILT/pS675lhcbmkDy2OOmjghilPFO6pFwTwDRZ1erDARTsBUcz i4XzfjUW5qGGAOlGQmotpY8xZ3tMGhEWOhs= Extension name: 7a7ir1o7 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3AE02B28AD2AD45

http://decryptor.cc/F3AE02B28AD2AD45

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 13 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe
    "C:\Users\Admin\AppData\Local\Temp\3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1752
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:664
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1820

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1752-54-0x0000000076891000-0x0000000076893000-memory.dmp
      Filesize

      8KB