Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-06-2022 16:43

General

  • Target

    8293834ce813c31f81669a2c7da3afee0bcb463f8afa5760d7b20bb386f52c8c.exe

  • Size

    163KB

  • MD5

    0b7227f16de64e92006885cd3ecbd95b

  • SHA1

    9dfa56ffd549123a577b5e4c98df3478bfe150ce

  • SHA256

    8293834ce813c31f81669a2c7da3afee0bcb463f8afa5760d7b20bb386f52c8c

  • SHA512

    3f24126b7c62f5499e13d029f46fdd6135ca90ac23364fa55043b7ed4d59b99a53fa250a681e6c84c42492032824b07c21d2029f0aebc790f267345bf7c2e607

Malware Config

Extracted

Path

C:\a3dc1qe-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension a3dc1qe. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EBDBC3E29AE7FC66 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/EBDBC3E29AE7FC66 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ySZpGb71QN9cpOORNrYgvPSZJQkegtWEbTg3DPOfNAxaisWjoKBGym4mWGe0pQj4 15JkfEXAJcn2vdlG8I8hZCwYJYH5rZnxXVXOhiBe17uVLg7uA5Q++OH7B+TlLwgy sealeu1R5slTSNLiEJHaLO45e5FQr+v1Tn7Q9yG8FKIjIK8xuVOHvehkT5p8Ty55 u7IlqZnqL/ZI65+gv9ls6DRbVgBa6PNwLv6pxldoG7tRe2sM7+G2B8nqAbqp9Doq k4TDsitL0c+a7wukYkHbhDHd6WpxM8Ci5t9L5pf3eRsIpyxUCu2ByFM/9VFbDd9y j761Gm0/DmOHSKwvyCztaAv6G3eyoF6GJy3RAjVTQ7uKaEo8dIF7IOvWAgUiis2B hGF4R8FfBxc0AH7/Fql3DbKY30NdyvNWbrIYzpxdFOkcQghHaD655MRyFUam+EsA DsoguK8vRSRzlZKGrzwSNK4c+uw+3ZCA2522+NhrgFcW4iDaDA0H2RYD+VaZvuuM VPnkmzBgi4SOoU1bjGuXez+acQjujPDTNnfd6nEog3i36KJIVdvTCHxDscLNCkRP jLTmMaOvN0MeLMTKp/cJKaIwS7Pn1k7mwbNffGPKdzUh7R3+ujovnfcBeMD1Gz1d q3vpCufsiaWDRV2jGGDA9/DGj4C4I3/61hKhdQjYV07QGxrsmTfYnBSXLBGBGwVr SuXcXmYQZpNXGDJyjThSwv1DdWQucfAGAyk1KwUxvgrkKQAyAL1EUZ3QfS1qIBGI PAGGWmKUQIpw4l3rdDXRYeoNna0W96rNVUFkBN/81VKFGaav8Fc9ha8Cq/t4EzLr O9lVhbfHaXAnqCgVttypanNqPIDacIlfPR12HkWnOPx4pz5yb7HYhOdogNcbURXO TwyoEZ/VtFqdMpzhfoSPH2NYmbLJbWAf7X+RFB5i7XINEyuOT8QnTtdMlPPmjF3I 43JltTfGMnlHIIxTqPlj1t5ECVQ61XGYJZNZw0PWDi4tdo0pvnHH/WdQys1W1i7K pytXmUUO2AQdUgNVCcSb2W8s4E1OA9N9hXEj7NImdIXNcVuT9R8o7LGHld3/bd6K OxsYy8KuxqSJcAmjabioAUvrOFFaFi+OPlIoxfV5ziA6uvUIRHcOJafc5XOISEYO k5p9mSar9P/8yw== Extension name: a3dc1qe ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EBDBC3E29AE7FC66

http://decryptor.top/EBDBC3E29AE7FC66

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8293834ce813c31f81669a2c7da3afee0bcb463f8afa5760d7b20bb386f52c8c.exe
    "C:\Users\Admin\AppData\Local\Temp\8293834ce813c31f81669a2c7da3afee0bcb463f8afa5760d7b20bb386f52c8c.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4652
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4276

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2200-130-0x0000000000000000-mapping.dmp

    • memory/2200-131-0x00000171FEF20000-0x00000171FEF42000-memory.dmp

      Filesize

      136KB

    • memory/2200-132-0x00007FFDCFEA0000-0x00007FFDD0961000-memory.dmp

      Filesize

      10.8MB

    • memory/2200-133-0x00007FFDCFEA0000-0x00007FFDD0961000-memory.dmp

      Filesize

      10.8MB