Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 06:26

General

  • Target

    9162943547cb0b16736faed5fa2ab2cbd1413336ee24eea5760f0c217eaa08c2.exe

  • Size

    164KB

  • MD5

    7152060419911ce79ba81bb6ce06078c

  • SHA1

    dc344544c39182a66984dd5d9130209e8ca765e8

  • SHA256

    9162943547cb0b16736faed5fa2ab2cbd1413336ee24eea5760f0c217eaa08c2

  • SHA512

    26d396d2ddcc61fe10d4e8e2940ef9bdcdd7d311d6aa9d457d4b8d5dde47d9dc8238db090ee8bf129b962e8564c9420eaf1727aec635c678226aba9bf3cc6e88

Score
10/10

Malware Config

Extracted

Path

C:\172x9-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 172x9. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EA4439F0A3DDE5A9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/EA4439F0A3DDE5A9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: wvwYyn7ceP7SmYCLVbfD88H8Phci/gMXewxn8AZWaRqAr0nwZAbqwPo9bqFe5kvP E68bbHbVZdMUXMGT7x7zaerst2FgnJDYV3EIDtYNM6GQZojNxd6Go41NWxJbRcnH snH8IqgIa2UQnqM0NX0JL0pcFzlAiT/TqbgiL89cIwMxKNfDYJMn08NXemd5Rm4t eGcka/INj26Joycq27gssVBC4HGeKridd/uQ8GI589NejZhWRapksT/4e9iInLTO SXB7+axgg9qlsS8uIYExqjDYcKLwgIB9R6WvbApvBmoIUlaI2I06DbG0rPulZe61 vChCiVZn+0Y2DrN5JaWw9P8itLLeP09oHq5QGftiyTbi70wfFqy5NkAy/FpKmmZ1 8ziYMBbJMYSIHx0TPmTWsCd69E5AomFOKjCgKyQ2PfTtYsBvWVW2OUD5jeRP1m5c jvy6+ek8Y7oFkacZGzIwFIfyc1oGZf/f1aMJM6I0V5qa+8BmBIXUF6IIUtHYAurP F6Tj3XBPxX56CnT08/HEkaJhzQhL6I0PifoDpb+DTUaa4W26KuU7YHKfBKkI2u7J K2If+dZLD07uIJT7HqKabMXp4SIzB/C+V4VB5dF+v4jOhtGExx8ghlK69jvcxcCj wnAOR3L21dhHrMKTXoCO6vti9ugmAtsR04JL9UttLSRK6+mSKqqOBqj5JfrBn+RM Kq1XBzZDHHy9SjaF4MBmyfr9VgBukV0GUmGeyP0GPu3vfizd0nXJPg0F2lERjKFp +NktpcRMHV3CxhKtpFXQFOfzPxzpoP6IUITHBltLIaW8OhKp2zpN3smS5zfx3H6W QWkL10fPKvHonQXx852OkO4Y8rDycBjYjJDCd3ZmGMMwe1s2UnzhT3y5ovsRPpCm Y1QUAbf5TdSse5R45PfRu4DErhYv0n/rHyrHfv1jaZGrRhzTk5M8tiRrwzTl0hRi aFrDo5ORcXzbRFNo+TIE0MHsHPQ4hBAU+t8jPJRjjHcTWzg3ehEkTncEgFSsclPw pP0QPcqy/0Isajf2bZddgpy7LO6nThQhn9g2tzhGeMzq3Ui/vn99zlm+8H5urewZ MOP4JmTtxmOw3xgCiVJ0xeAJh3+V1uC/Czmo+pvJq/Z1tOYAHaPMijGh9f09ZmhZ Sf0kcAR24OU= Extension name: 172x9 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EA4439F0A3DDE5A9

http://decryptor.top/EA4439F0A3DDE5A9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9162943547cb0b16736faed5fa2ab2cbd1413336ee24eea5760f0c217eaa08c2.exe
    "C:\Users\Admin\AppData\Local\Temp\9162943547cb0b16736faed5fa2ab2cbd1413336ee24eea5760f0c217eaa08c2.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4340
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2524
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4340-130-0x0000000000000000-mapping.dmp

    • memory/4340-131-0x000001A370A20000-0x000001A370A42000-memory.dmp

      Filesize

      136KB

    • memory/4340-132-0x00007FFF94690000-0x00007FFF95151000-memory.dmp

      Filesize

      10.8MB

    • memory/4340-133-0x00007FFF94690000-0x00007FFF95151000-memory.dmp

      Filesize

      10.8MB