Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    05-03-2022 20:32

General

  • Target

    1eb4df21d3ca977bbee0f7a87b5569235a517e3577d31a9e796c630796994864.exe

  • Size

    141KB

  • MD5

    c4eeb2e764bae1439b6c4aa6b2606090

  • SHA1

    054cf83042d1ede13a5d11c5213db0f34c27e43f

  • SHA256

    1eb4df21d3ca977bbee0f7a87b5569235a517e3577d31a9e796c630796994864

  • SHA512

    35adecfba86f260bcc49a33c1abfcf32aff3271ff09a579c9c3cec6bbdc36d608d39ea0edb93755f193d12aed8a11aa94b243511839920d679769b62cd2e7eb3

Malware Config

Extracted

Path

C:\jj29231b0-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension jj29231b0. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CB606EAE99CCD40B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/CB606EAE99CCD40B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: f4bKJ+Z4Tsg7+CSbi1Ce5jeBkq0LuNAdAAjKr1PiSQA7wX90FqnrvvIKqR3eTb// 08uP6rDu6H8/gpTqLjBanmzzZ3Jng6biv81BhEOiJqyWmBwCzX7dIjVUvs3w3jxe h8F+SZSHl2J7UYJXK2t3QFS3+Lqudae8F7m2MSHTmRdSthnP9R/vuLgjbEJMqvMZ xXFY7m51QqReZuVavGLmh3NC+Ngsw10LnJXN4L+ORDlo2F07FCVzN5enU2KbkWn+ elBjHjTHJlSV4kurYnqdcb4t1TrUbjV7JIcBQfwrYiuC1uDkp+T5zxL6iTu/UBNz c9frwnBHTOMZ5tbRnora5mJT+Ovvnz2RJACULH0Gt2GPSIrXPJsgS7mXJgztRYyt feeu+Ypc0LUf6COX53g4F/F476SfFwINhuDNLUme/ozjUA21meOaFiEOsHSi3xpy yyxuaWOviw5ImonXx8X3fL0e4C30eTX1Qp/469KU+03a1rxvkBRUXcMMloA4/zET G8dDCaGf9LkTLakJjxxKP+8NvjRSyyBXMP0WlS/ADVhCy69sy38CSlbgejUbjXX0 Jlj1t4RcCvmxH34ftdXX7p3FevK7pJo+CNsNVqFiHX7nmkmGll9eF1UPl9mSaBfL QlfEIy/WYkHqb5QChvnd/WjJF1qoydeSdrPdOlfvVby9cJjAomLAjtvaZqb6eBsg i9R/bEwkUtJCFMNxy/kzrg3LdEHTOoWTn37dWx9d4kxBaAya4XgNaqWx/Jt86hIq mxFnxAkNPkm6f1rka1t488nMW9off1N295FoqlpSJdr0aTj9C7WrKyk04WK7Tre/ jTzC/zyuTm2g3mzyvSq+pozg+jn+4SLUDjSYK3NuVudB8Ru7VL97iORMuxQkEV1O /9YqgSBGvnVb5wzulJx9/ymmNE9ZPYJBTTaanmMalG2aJt7dMZmGOAqDR8siiz1d H4WvVUE2w00TTp10gjLh01Z9egpSU4wDZgXKAI6qa6M+CEJ/6tFeZj9LKIsXLdbv vgW/PDtwofYmrVkPFDow2NSINUqPAFzQYcBGoxP4gNJoGvwWk8/eswWDNO+gXnYR nMm+yXZfeKDkg6N/fToBauZ3UEc7Lbtdm5ztdMvvOuM0KSfXxc62ST7dy6BZuN4o RQ6NSF0S5a26rror+tML/RGtjf+rYSGVIzfJ4sp1NCy0vv132oiorlKKY5krN6U6 fRBcGFL/xiC+NcPjOANEycNTkAOPes81uBTHFyKsCaN0lsPAVL+z4kPzLy7PSqc6 s60Pybswp50kn7U6muwgMQYREG9XXl/QKd7ps7rUmya0Q1Uo ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/CB606EAE99CCD40B

http://decryptor.cc/CB606EAE99CCD40B

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1eb4df21d3ca977bbee0f7a87b5569235a517e3577d31a9e796c630796994864.exe
    "C:\Users\Admin\AppData\Local\Temp\1eb4df21d3ca977bbee0f7a87b5569235a517e3577d31a9e796c630796994864.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:816
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1928
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads