Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-06-2022 23:21

General

  • Target

    241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe

  • Size

    164KB

  • MD5

    e33478d6cfd18b5e8f8eb0230ac48f86

  • SHA1

    475982ccdd5d38630ea2d2e7096681505043f2ea

  • SHA256

    241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55

  • SHA512

    a9776eb65a010b1638581ebf6809d3dfc8f28b8f20ed7c9a3de13edbd440ca4b767bfc4a5fc5120a7ab432cd5757a045a1ec37712784505bf055ee97f48a7368

Score
10/10

Malware Config

Extracted

Path

C:\94v56_Wannadie.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 94v56. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/85171E482CABE9F5 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/85171E482CABE9F5 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: hKttpnOf6ouctx1B/V721u4uYkShDoIhUUy/5MSPL1CbBTKWMyJgsqEifLTflyuv WDzldB2zkH2rJ7XUQdxxqjBqlrdg+xPvupGzScZfvwbK9pS7BeLEsem79Zy4+ws/ OEpDJ3KBFNcvad+rUgKSVU1ZrlXh+BYsyRXS4jtLRRhNsHajtLDQV8CxVV1PCrwP p2DGjS5q3YCbdIbRza1kXMZ3SMVg8O1nWhxHoHO3ula+BzRmJ2rtxKaibvDaYlIV 52zQ3nZmvJ3AjCSTtly1GZtB5eL1oLzF2XgOVdTHLTdx14OA3wUJexjx0qjrFog+ TnilHQaAb7Z3ijc9CzGQ8RZSvWefPmpFemIO28rLNeUyrRCVNy1JpkPRYj4jvnvw sDjHVlG8RFOg2ru/+EhqQIiFcRRrj5IO/LVxvqHw0RjxjS8ImoL5GBBpq+FcjnEZ a80wOR034EMv+9lRw4Hrdf2sFt1Z9WtApUlR9x7EJpwjLUtULCCpK7FMDQzbDAps 7PKtn5tanOLzbchrwus/L1oRRN4xRoHD3leuPmiZ0pglcuBveCSUHU4jbtU7JzMj hbsc0d7OrFMZ2nmkfWH6w/ANYgY+ngopK7LYLICVcQOIk7eP8l5+MpTRsjB7DsZh mjhL2cZ94jwiNbaKJ+ccOlKnGXgLDjaEvbhfeZBdDCFDCmJfBh0zmq5jkfpbBnR3 Owm1lMhYbQzstaeEloxIt0lomsXlA7FLp0OQYeKC5ET8sSeBN1G/04ZOF3ldRSf3 YZyXXthL38FXA+zveuGYNQuOwNxfFESMtzq2j95nleeEaXotC34NYDDWpKA/VNHv FDNxvuW+Xt1OzXQIyYJ3JXvqOQ430nAbFKtcwkRF3+RgXjbjQQFZS5B1koEp2OTV 8kOIMhyEMSz1R3TdT0nNO9NORQAHIZIXohgHTUOGBDCx/jBfwUNvapSx13E2E0GU d0iyQ7HbQeEinwDo5Zp1StH9tMt1uOwZiVGesMsabKp67KmoDsJHnADItRk0cT5a 02yK/6nQ6YKgQVYYf0YM4LIomdMoDw6JoFHsItlFMk0G+kJbKixporvrRVA7M/AJ ZoflNIuHV8kE5Iv8jBNHuVkiwrJT0TBggPlwCgIDJ04/u+EKzKxZQ4ud1BGAcg7J 2t1vVUzL6jg= Extension name: 94v56 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/85171E482CABE9F5

http://decryptor.top/85171E482CABE9F5

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe
    "C:\Users\Admin\AppData\Local\Temp\241c852c185d13643fd9a4974f62d30aa5f412688afcb76760665c2505a25f55.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3232
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2800
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3232-130-0x0000000000000000-mapping.dmp

    • memory/3232-131-0x00000205AC850000-0x00000205AC872000-memory.dmp

      Filesize

      136KB

    • memory/3232-132-0x00007FFF9B510000-0x00007FFF9BFD1000-memory.dmp

      Filesize

      10.8MB

    • memory/3232-133-0x00007FFF9B510000-0x00007FFF9BFD1000-memory.dmp

      Filesize

      10.8MB