Analysis

  • max time kernel
    151s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-06-2022 14:37

General

  • Target

    12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll

  • Size

    164KB

  • MD5

    b4fe61c29e23014fdab44ad0d8df1d2d

  • SHA1

    2b76199d726a16d3c25d74b3562fa3bdf4bd3d52

  • SHA256

    12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf

  • SHA512

    e54d0113f866a210371f49c4d79f844259cbc58bfbd198a16c7d7ce223d18ad0ba6f5c1cf9b93629b97f8062ef4955e9bdce7ea53256029de1a93c88bc382acf

Score
10/10

Malware Config

Extracted

Path

C:\z63wvyk-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension z63wvyk. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAA8E56BDA1A76E9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/AAA8E56BDA1A76E9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 49X0FsJqycqaFIhcdtgy3f4hDx2GGLSDVdjq0Jtqr+J+Yk7OL8vSOMyLSsiGjcKU x8xLSaQCwkYMKXWP6YBN0GUI1AY+7PakdVJ4Zy8CF2W6faq9wJiXjoQzEGAFaTk0 9lWIEjsbomZn/GQHgij8sltDuL4eURGsPqTDXUbeqC5eg7Lv/0BC5Exj4K9h7cd5 VGhgD6caKA8dcGntAZ4a8/yU26B7U8KuImldizkt8wiFcGmyqOnm/8vYwMdlksJ6 Mv2/zghns5QSfZLs0lMjY1XPt14iIVr4wh0Qkf8CL2dbksmeSXgiIhsTiS6Xdmxd +cX1vK0b54oH1AnuwYVl875sNZ76AG2SmKUCwhNIKfbs48mSlTG/AIC6xyiixtIX /jSLSH/KinHdyi9JK7wJdFxWrxfje3LbpRvWy0Ez5jI8qfT5yeWvzmJIvEM3mfQx Is2B1l3PSBwj1IHN0Pj/h9BIP34FdFcIlVrXnp+EHHWdm7HKfAwCijoZykk9dlzd WuG7F60I86DpDnKMruBmsHO+wk1BNeOGYcMDkPuTQ8pI8xugLSy0PWfxa8FSVOwL gzqDFF5XPGJe2hYarP04Q1CEKG4pwePFtcM5HNM36M5osjSweNJz77yvH5LhM3k8 D0jEkK5cKVzc1au9ZJjFJEHdgdKvBtXGcGfaSTbBocwhl6GEwaUkUTP74Hcpr9fT U+ZTSaV1glaifGONcVjDOJClfbe28vUN/hDEMFOVj3O7J6CqcawHxP1cY2Hep4ZK iyRP6eKiC2S4Uo+IVCLzcor9q0JxQ7yU18kSj62J7im2OAkSaZoBAo8j+p1u71wa o7AsiTlch09ZXcGe7WdGEv2hQyfH6GPLV4B50BVXLwLFXKaBUQ729AuybfPBaB/M xXYb6tmZuudlG74LW7QW8LpKG2gmAs1JH4svDBL2OkRCZXW0co7hXn7fxHR4hxrA j57of5nR97YrVaib4XCCC+I311abV5S7ohA//7MHxdL5hMmDL+ehb46cX9SDJ6LC Lt1O690mFTDF9Oqvwz/ICHpphUvFHwgUTnZNDmpsVlVkzMxJVlm+sNa5I1KIJhZG kOe2nz229iSPtW7+OlwHoMkR6CkmQ8gojDriKCPUqb9JHkf/KgcMehQhycBz58la hlepw1QsDkAqd/oD Extension name: z63wvyk ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAA8E56BDA1A76E9

http://decryptor.top/AAA8E56BDA1A76E9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4600
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2808
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2200-130-0x0000000000000000-mapping.dmp

    • memory/4600-131-0x0000000000000000-mapping.dmp

    • memory/4600-132-0x000001E945CF0000-0x000001E945D12000-memory.dmp

      Filesize

      136KB

    • memory/4600-133-0x00007FFEFD270000-0x00007FFEFDD31000-memory.dmp

      Filesize

      10.8MB

    • memory/4600-134-0x00007FFEFD270000-0x00007FFEFDD31000-memory.dmp

      Filesize

      10.8MB