Analysis

  • max time kernel
    97s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 21:15

General

  • Target

    5cb49636a0d759cf24bd19ce17003a62f1e8d4d076844b9110af8b9172413508.dll

  • Size

    164KB

  • MD5

    853ab7bdeecf03306178f4af40eff694

  • SHA1

    ff7b52e2ccf0b4b908af478cb477bc67bae61321

  • SHA256

    5cb49636a0d759cf24bd19ce17003a62f1e8d4d076844b9110af8b9172413508

  • SHA512

    c9f1de2facf37a215ffe580024346a2a5873c2dcd378cf5226bf9631aeebd03a751f51331aa17bf046033d47bcd4309ed761d74fe4567eea0a95571bb5d5a1e6

Score
10/10

Malware Config

Extracted

Path

C:\dl575844-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension dl575844. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B78A0E79F0ADECDD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/B78A0E79F0ADECDD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: z5LniNBAaOYHKOcN+z1zIU13rjVp7e3reQbyEICcDEWX7HMdI0ydWvN+UydjK211 Tkv+WUmjdhxyfT7jOI+fNF5jX7nt2LP9H7lumYgQGsceZTzMRBQI7xKcl22lQShk yoH2hodjYbaHCtLTzoXzATz4s8OKQVlB4/dRRsg/7ggloEr+jCuBtFfvY0k0Ehn9 bB1yZfy9K6orbqulNTtSHcR9Okc708ta2fEZmVgcXd08u3pkq+7/iGMZ4Rp6MnTz ks24XDrsviF4/uAhtalId0xORidMUlnL8x6PPjBh1jLysnzq4RyQSIW5gYLggsZ1 G5IPQm/bxOdLSV4W6TqxXFxN58sBE7NDWWRpTJyMD+UWOTMH29Lt4EzTXEtBwPOe AfZP9R9SvaCp/VmcSWBZhQjH2j+66ghi5JMEDEURNXWiIF6iW5kAgcQD/T/BIzou e0gwNaJrPd+fEt/b8nYYA8qT+Ru7MsdO7DvsRdTX9r1gv6xtLB8kDEUY4T4gvaIL 9oCWhZPlAgw/6mQd2xnes51NiBXwIWr3mc4Jivy0Y1Lw3JpsVihaUYvtL9cUfT7b Z8UZHfsngW3ZCkwlOSGubhEffnWwviC6LNVi1uKj1NLH64y3JEqTazDh9vRW7U+/ oUVbjHSfgdBd44cG90F9kk6YH/PzTM0+ACMHOX3MWGFJIsZnjgVKOEofp2tZqzuB gabIAZo2POfdKOPe5v6SNupPHgwa1rh8sBV4bNS17zK1AVKJNpCngH2xB86K04// z9pcPzcOMYBAoM/DhgPndtOW/fLVuIb/skmes58acWWr7oURwjTAgQ0BkAPNcku5 4A3nu5SRq1wUd3cXH0ZKmWT1fWW4IdRElGk+LbpGBEW4YNt8tnxL6an6MrCh4iJs JOxFXUaJXabgGpbcoBgF82O83DWdc+stQjHLVfKzWM5mcwxD0BC9c6e8l4Tn5Z0p F7hq6Qu304ykVYVgqbi2Z1wxMmsRRDdSQDZOSb6M0ZkgzvTYcP5j9e5pa1IPcx/O /erD1oOADdwDQL/+l9D3Lhpijg231fk2VJ7SjgIUlNnMqS6+Pd9ec7CrLvo/hYxY ZTjHYOvwNcIpunnsYzxtFG3WfuOx3sGHNxvPk/f7DeNsj5ltmbXJLdEjuftR1fRA xTh14xjC/plcV1BlCfg= Extension name: dl575844 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B78A0E79F0ADECDD

http://decryptor.top/B78A0E79F0ADECDD

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cb49636a0d759cf24bd19ce17003a62f1e8d4d076844b9110af8b9172413508.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cb49636a0d759cf24bd19ce17003a62f1e8d4d076844b9110af8b9172413508.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4196
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:500
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4344

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4196-131-0x0000000000000000-mapping.dmp
    • memory/4196-132-0x000002364FD30000-0x000002364FD52000-memory.dmp
      Filesize

      136KB

    • memory/4196-133-0x00007FF867DE0000-0x00007FF8688A1000-memory.dmp
      Filesize

      10.8MB

    • memory/4196-134-0x00007FF867DE0000-0x00007FF8688A1000-memory.dmp
      Filesize

      10.8MB

    • memory/4428-130-0x0000000000000000-mapping.dmp