Analysis

  • max time kernel
    157s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-06-2022 13:44

General

  • Target

    2dc6832dc29aa83dcc6d0a6b2d1c9a17636fc4467845ef4c8ebd34738a8677f1.exe

  • Size

    165KB

  • MD5

    74d80021ed5a26b41e1d88e72585c39e

  • SHA1

    5dc7989d79e1528a5d7b03ca26a6eaa13bd73b2c

  • SHA256

    2dc6832dc29aa83dcc6d0a6b2d1c9a17636fc4467845ef4c8ebd34738a8677f1

  • SHA512

    234b2779ee25837df002d73b7bdbb2e62fc5dddcd192922aa83ca2d5902e224a6ba835d6ee3def479a5c74b9a662aefc8c5528731ba1306e58ee467fc1fcc0bf

Score
10/10

Malware Config

Extracted

Path

C:\99u9lh-help.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 99u9lh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8F165A2860446145 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/8F165A2860446145 c) If you are having difficulty purchase bitcoins, or you doubt in buying decryptor, contact to any data recovery company in your country, they will give you more guarantees and take purchase and decryption procedure on themselves. Almost all such companies heared about us and know that our decryption program work, so they can help you. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: gKu3gOgB7q/VMJCPzzARbZpDHersaWkxC01g2Gxgfag5QdTcG1uXiT8WJEK9kuaP R+SmyJ8IJG02KNC6taO/cSKQ2CzYthxsiE6PoltLb/WJaav+sAI6KrIpMfCzP60v YQ3CV4mGRYmfoVWRQI6X1tvaW2DKR3lPYxlXjESoW+KZd67MZ8KWuB2Ny+l7szBt Xry+uu2rIWaSle8lEGaCQUTZXtvWqFLv1g0gxfhYZn38+iHlLm6MCXKdHmJRhoN0 BBQOtfVnTY0LNmgO4duvDlH+MQPNzQKnybSTvQwgYdDMBOS4jSj8Qurh7xsy53xF RUOS1CwR/ofTBF+0J3u88b2+GnB55KyzmsqL+MEPwLK5mwDyaZfnA0iT+Y4Ex66y dHaj0Pl1z4LJsJjI209iTxCF14GDJD/ZC+QclBHIQtX1JBhToPbgbH9Uv8idth2n lDT4GlMbrJTAQQMCjjsL92CQCsXvh/cUm8EeTlXItrn4CYW64K266Z0nei0H1w2f d3XLZvX8Bq8J65523HrN7j1h8YKADJvNHatcSk5TEFlDHkBDvnyWVcYJzM/wTHNy JioIStkTzX5qkk8J4WeAdpAg/eYfsS56es9++Oc4HpY25hg2I4Cy61Ve95wavMzi BtbzSN3mou2UCkBq3X0f7aBtJqJBJzqAoxGUZIFWSivIJG7A4cwqjANwowESYbOf NkIfd/OyBxehGpB4u9qomBu0kIyay5WzOqTtOpzJ3XBck9n64XEhPLilkjdo9oKq CzZQpIMV8NlfmZOTwre6F9Vjc1Is7QXpjlv1JhMLLNPfYi+l2zK1PPc1/WZMz6IT p1En2Ernk+l7EU0KnMFsx6jsFAzclvV8q+UJiGEaf1YmWcz6+QiC8C1753dHNtkh 8FZOOE5u4fxsavnBnQuLTRAss83edVSsySjSPdnCcRrBW1zOtNL+pxHg5/OMQ6+j pZSaaF+GMiYndQkpXOYyI+IgVTsRnV8vmaZmh3gUICpAUJA8/bXaqUiDucMcxnMO vi6OCrNHw24d8V6R+OVQxJS6diCNBQy/yIi7G9y00/YiVWaVJYvD1lv3nlXmtphN +GnWzCFk8XgsYvSHmPoAscXm4uLVVAjnw+9biAXonxcPMy1ISDuwHlysLG/EBvOr nykQOfiFnRk= Extension name: 99u9lh ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8F165A2860446145

http://decryptor.top/8F165A2860446145

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dc6832dc29aa83dcc6d0a6b2d1c9a17636fc4467845ef4c8ebd34738a8677f1.exe
    "C:\Users\Admin\AppData\Local\Temp\2dc6832dc29aa83dcc6d0a6b2d1c9a17636fc4467845ef4c8ebd34738a8677f1.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4900
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3680
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4192

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4900-130-0x0000000000000000-mapping.dmp
    • memory/4900-131-0x00000267B5310000-0x00000267B5332000-memory.dmp
      Filesize

      136KB

    • memory/4900-132-0x00007FFEC5290000-0x00007FFEC5D51000-memory.dmp
      Filesize

      10.8MB

    • memory/4900-133-0x00007FFEC5290000-0x00007FFEC5D51000-memory.dmp
      Filesize

      10.8MB