Analysis

  • max time kernel
    4294110s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    07-03-2022 00:30

General

  • Target

    5fac1a1b95c5esvhost.exe

  • Size

    117KB

  • MD5

    a9f731de650ee1ba0ef91e1386ac2dad

  • SHA1

    60f6ad3ec25581bb53dac56634cff820e0d6fd81

  • SHA256

    5966c25dc1abcec9d8603b97919db57aac019e5358ee413957927d3c1790b7f4

  • SHA512

    248f4e1297ab1e00fda37dd546a7f173ef5d0a0d2fd656adba97f8f07dfa0e1e27d9a7cc4cb55f3b451f7e5ce1ff7cf569cd3da42c91d1ed1bc16a6e93c9c2d0

Malware Config

Extracted

Path

C:\02v43f4e7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 02v43f4e7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/68AAAA057BA4DA9E 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/68AAAA057BA4DA9E Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Tr6vi8wSj+pxGPegIRkd/sTkqXm1UThzkMdif2B85sWrsJezA8gXCeHE9FDz3Zbj 7m2y855/aTVcVBZPIJty558EOWXL6zoWpveMr/1BOpjl37VUcE4NLWNuLB4SEsDh vnTqUaDjOkqdnQFE8cL2JSKGTJm+biBUhE1YN+7+yWMKb81VbxsDc29FYUiIzkny KjHVjyqf/NL+i6fk/T+eRNREgNI/6EM5dMBlXGAqm7e7YL+V99mWVuWTtbmt0BYC jTfiwY5/JCicC50eO5YzmRZPGdQMj24NH8yBMLc8X0jhRxDu+88SSaFQMKAQcYRv SemCXv96G/0f2UqcOsHanzDGp6+3+uKG575rq6++fjuZ8RdcuiMGxy/JBr1cj0QH FXHPTnA/YOC98D6wrjeHkzjwJWTqXSE96+lpLXNtZd9Y2aI5NFs2HrNNhya48iXN hmRif7MGXEZLUtNyj5QNDzoM+WfUNTUjiPFD+RDvGs0YrkOnMUws8XeVRkp/UKtL zLoBss8aIiBwFzNERaxDgPW8SCITYolqTDSGZRjW4nFJge8a6nCZBkoR9EAhVoJJ sEp8FnsCB7RyUGoGyN1KKu2Azp4o3a2/IPzMbvUog/KuNJ6ExDQjcH1MSNW38SZU jPoTLYEM1mxLwXS7VKXwOGFPVNu24k+dG/PXupVqXQ1OiE5yDvf6MHd+ZwiCUXMU 7dtNiGeysEbMo9soYVN4kOzH7ObvSf9etHH6KSNqlOuFAxh0d2w47QW2tn0ozFnU EvANd94yH9ntTb8eIV5txKcPuILCnsc9XqrcOIeSbvIgqtxs5aIr8gWn3MpbI0t9 HnkQwpWvgJp43I/buXLHXEghxITVgn009cqKA6CoWKiZT1fXO6Rd684XraQLbT5q rfn/cTHYVkIbS+WJsabUK94BtlQzWuQpWPkKgX8iVfu96WuMitn9NkbACcXMmyY5 Jv4CHllK8+00P1woBBL53tgXs/QChAmry7Oa2RSt0zEX2+Xi6WAkR1YkUeCzzB9Q lLDYl2C8Oi072fz8uzsZgayyhiDEFKnBqOGwldXQHv4uJo0TuBKMJFX1bZV7E6Mz dstnxU4BcllCixbXFfsF4scV5+MsobPzkqTlx4GiMNOzML+xIE26ZVZcaWBTlz3/ m6lhJiE3oybJFmSukQbOhSH/iSZKDiUqIj1oklmXtU4p3WCSgiFe3pKGnfACCsDi pY9EWoTIXNrTCZe9Dbwu9/iV0YfHJ8T83SJ69No2ah5bknpxt8ur0SAhE9SjCwhn K0bVIxczfs3sMgORUEOvbrmr+7+5vvDSDXRoguRR ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/68AAAA057BA4DA9E

http://decryptor.cc/68AAAA057BA4DA9E

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fac1a1b95c5esvhost.exe
    "C:\Users\Admin\AppData\Local\Temp\5fac1a1b95c5esvhost.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1076
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:468
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\02v43f4e7-readme.txt
      1⤵
        PID:872

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Desktop\02v43f4e7-readme.txt
        MD5

        da17d155be6e3dfb363e4643550a12ec

        SHA1

        dcc939363c80bd49ec411295b5fd0a0f7f28a7c6

        SHA256

        83e5ccf6e478cb642f84bb33da4639c86f74d91e637f5d96cd14da89f093750a

        SHA512

        a540b74c13ee3d7f052d58c782b43c32d5708aca56282c8d7d78d15ddf541631b438467764fe953c942d7293915fc493c9298c9f3e4188ba33ecd855bcb5e461

      • memory/872-55-0x000007FEFC381000-0x000007FEFC383000-memory.dmp
        Filesize

        8KB

      • memory/1076-54-0x0000000075801000-0x0000000075803000-memory.dmp
        Filesize

        8KB