Analysis

  • max time kernel
    91s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 21:14

General

  • Target

    bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll

  • Size

    164KB

  • MD5

    f7f3fd2b59b0979bb7c8265122547f9a

  • SHA1

    b8316833bd136d8b41422995fa590f44ce809067

  • SHA256

    bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed

  • SHA512

    0fca83351f1925db5626218c57087ff76e3a0dc0f1a5a5c54057d140c83c47136f0265ead345765aef4ef9d81d2ec4f4c8ec71f87f1ed1910bdc0c2ba2ac9d27

Score
10/10

Malware Config

Extracted

Path

C:\How to decrypt o608q-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension o608q. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64E737F5C0263001 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/64E737F5C0263001 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: CdUoG7svA8t8eGj1Afe87pOGYJBq8LDabSYq7V6b+vkrnaoAu0uLA28rYb125jWB 3zFMWol+Cn54F+bF8XQGIa2B1pgccHunqot5VNmE1PzdUSJXHW8DlaxAHj+8U69C ME2f40zVBbo5cAvXpFMiNC74TB+7h7+TuDsk2cdkD4HmooStMANhc0OBz+coj4dK zyzBmCxdR91iXSuRaUfgDPiJfles5zXNZ+O0lZtYzS2VxkQc7IW7L2JoJC4+7nEQ SWP6Gra1M6Q4QT0OHzWSSrb4D+qEVIgV0eyw5AR6jS91eqHJV7yy2zdI31sq9lHM WzlsFrR4O+N10ZT6CphT9l9KkQ1N4lbLxVvH2wC8i+97DyDHIjvsow9UP9+0Uk+R 9/f+8+EbfOapJY7EeAFXwvXf1nmt2rwJjN73XRZp5AqJdgPjJW1VNOeLg2CeBkRP QdT0FSYwHpbEGouhwmzPIfLelRWFO0+EUzKGN8ASBBDc66xJ5UnU4zb8RwjnLBPJ kYZBzdpBcYruiSE1jQlXaUokgSJCoNO1aUWC1R3q3P7U7qkk+mRDgndVvuxlgkhK 4JqctHnWGoGxIPfjLYoEJfeyDhQvxQrOVejwSMcm4n/Nxj+g4V7yw4KEqItItEGO 4PDmvrWVtUREy6/0HQVNlnQQBcDbIKqq6ItWbct+MxvXKDpocrQlNR931/VqKP5D louj9utZEsu/jEgNyFuaF4Mycha8PQoE1Qw31xAVW0l7W87cGYqD2/68jnTObt+r eKV2fnTlD70WbKBvsf+Xai3HDP5FBkcapNGr60XgulYDsKMmfVv85sro57ZzNboP z4pZTWmLz+ROSrr9Hd6LW/w82r3peYEy0tFmrxlvlVNfW7+Y1BiSi/VMigcvBj4v s5+OCCCQti1fi02HY80yEcC+1fGVy7DZgRI+OxzNoam7TaxOg20RgkFoFSCcK/zO qOLF7PMqXv5ZISSET/8XcIWG4l5CXrFoO41k/Uj47htHHsVYSi7vJZCCnEurOdgO 3zb0TB+OShsxjppSeQTrbkTKW2wrt/oNFukjdeqpIxN3dbrPo43gQyQrsu6p72Qc mZPjl8uYcipWu/d4oPs5YbzEr890PmRYkECC2/KR39+hayJGI/vQ80wpomuYQ/xM WvEGIFOfcmQ= Extension name: o608q ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64E737F5C0263001

http://decryptor.top/64E737F5C0263001

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4768
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3760

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1536-131-0x0000000000000000-mapping.dmp
    • memory/1536-132-0x00000149C2DF0000-0x00000149C2E12000-memory.dmp
      Filesize

      136KB

    • memory/1536-133-0x00007FF937670000-0x00007FF938131000-memory.dmp
      Filesize

      10.8MB

    • memory/1536-134-0x00007FF937670000-0x00007FF938131000-memory.dmp
      Filesize

      10.8MB

    • memory/4068-130-0x0000000000000000-mapping.dmp