Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    05-03-2022 20:26

General

  • Target

    3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe

  • Size

    118KB

  • MD5

    c09cf0cbc98de58fb8e47dce63b5f1d5

  • SHA1

    85e72911847b77b2ada5a9e8edeb1822358486ef

  • SHA256

    3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609

  • SHA512

    7f4d0f85364b0e7cc87f8b58b692ad7b712adc90ea1824f9f6dbc7863ee28103ea1846cadca7155ed154de34bd39f455715d94b06e1a103b9a7c78c0501896da

Malware Config

Extracted

Path

C:\i3f62z-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion i3f62z. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AA34CB90038F0CF2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/AA34CB90038F0CF2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: KZLJ+KzqST8NdkDdlgYou3A6DqYxSC4N5VcUBDj/7/ie0ZqKaDVoP9l+uAbWBU78 /qvmWGuprFT/gGxB/uWBlFcCJFUBl6PV9zWWYAGzKHCNdrQ01iSN5n6G2zBRvUuG 6nVJKqhtY4iDlNTqaQqc6K73HBrs0yLqc4jYksHpS/liuYx5q/rnZsLBT1doYUqr 6m/esiE3Ltlqu1RrlBjWKxkMYYmaMyfe7ALn7OGm0kdxlry2rwySSSj+WXQVEqDH HFXkOpERv1cTG38X1T62XfKX4iAC6y6Mj33L+Wc7IFRH3tZFyIdFera9hSvzY9tb VNq8wfPqjjFoJttIcpLQr20Ea+ZFVQ0BcxWP3CBxeAQ0OTpSkiR9Mi4pDM9YUDhI sXZ5TuYQ1csZCjFMjeP3e5zwvcmP+TFblIJsNb3p+ei3N8UmFERy8HZ3uVgr5/n6 nK8SVc0FcPG60ge8m34f5Q8mT7yub8wEQMSTNTdXP3kwtygNvAhC3Cctg2wiqvL4 r8rDS0cBhnFDVfmI14AjMyKGpnqQ2rqLVeJxQFhQAxBA02rs2/5W7pKw9nhZuTq2 Eo759AHNv+hLjRPhXFfCH7eFQ1rvUjFH90q1OAiu70KZUfXR0xUdwScK8ikbZ+wm dFcBbDFUvAJee32fFgFIOeyxvLnYGUekbXJAoBatyLV2/ecpvCknRTdqxEIAOXNc p3W2JdcIHloAIMB6QM0xYPlDyH7QQo5mFr+mj/LPUSkhxVNJIu0w1DOqjQ/g3xV6 G+aSspyHsTOPrV5ghZkuhVWCDFa5kRVwYvBgWd+PjdFT383UGUuz0ul6W+7SyDBw rzgRDDtGot/exE9UHS+QIvEJghPjblSJLsFO7wbi8c28LbtJlvxnPI2gzqDVEhLN fX55Zk68ez8oMQ7TEcWyVmWlvioEsdJ5LJRWBOAhHfNSSUSK134Qg4/M5uL+qpxO 1zhqCOTMUVTqc7bKTCfI0OzlUoXPPT2y4bJGElhpA+HDxR53EDFBaJFX7K8w8Pwb qVUDY+AjxWyS8hwgLvBl74ahMEVoMM7fbbdIApZxByE17Z7bxWfqxVAB5CDuxN+7 KH7apqX3QJveRxgw/3b2MibJn4lf48PYsOeBF7uO8YpnShdZpVq3QSc9iROCvypA kAF51VC3Xk+g+JsHLJI/8xGS0VenokIsOKb8GTMbiociejaMl1jLnIQT/28czXgO 3VFuextasFoFZvLr91kBLpDou5+bQ4xEoxkIMXkfiNxFCocLHR78blQUkeyk/6mL BMl7hFMR8EPU8hnzMGeLyaQRGg4m4BCcwgxM7g== Extension name: i3f62z ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AA34CB90038F0CF2

http://decryptor.cc/AA34CB90038F0CF2

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe
    "C:\Users\Admin\AppData\Local\Temp\3da2208a661bd225693ed95d7167dbfc0fcfba93efeba1328086e20910ffc609.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3056
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3616
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:368
    • C:\Windows\System32\Upfc.exe
      C:\Windows\System32\Upfc.exe /launchtype periodic /cv /eTf77BJYU6svl1y/C1aNQ.0
      1⤵
        PID:2056

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads