Analysis

  • max time kernel
    192s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 02:50

General

  • Target

    0c280ffb12537bca109724ec89d1ccc6.exe

  • Size

    179KB

  • MD5

    0c280ffb12537bca109724ec89d1ccc6

  • SHA1

    a8d5d8d5d1b8f288e919fe303787c5e1869ad653

  • SHA256

    a728d45de941ca5730401f224c80fa1dcc2224477e309f5e4a1de8276939dfbf

  • SHA512

    13c15edf4f022f74b3dd57cc203dc5a6bdde773a85ae83df772d536dd4c538ac11415a7c5d8fbb8b39e5e27c52d869a4b5cb19eb7c21c799e4bd8a53440b568a

  • SSDEEP

    3072:yEa2d8CfSXceqmPDu4lPZU/CZtpysa8ustqzhy2Is80nwnyxVps:ACqlPDuGPG/abesYzg2I70nqoDs

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\2j5k85h2iq-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 2j5k85h2iq. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6647887021D9C3B7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/6647887021D9C3B7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: BCmccq6sTnJwgu+ei00BsnkTz98QWE5D+fML1NtKCwhLEtdHaKJzjna5hiP+y2O5 kYg63nuN7AxRLeLM6MlI0tadVPbvClXDQgqfwpesI13K6m+mMBOez1llPJ4hrhxk GPVLSnbSelKIm8ZM7Xd8LQpBEBGda9561CJttlvCcFAFtzzqIyc7ZvkGXjSwTqio 8493NW2HgQyWS08bbqEErWPMwfwDNZi/Ii6vi8MsYBXDWVbRyTaJxArlt8Rb7yyE AbpX/Y29/Rhv3r1o7QUIBznFBmP5pYfV/HN01+zhc6tOf3L5j76YhD9Jy3zNiFvk Sl4K9bZMmnZeJ6Jt+xsWGeYI+w6Ka3YM/FKIdNh14j2y+oRBqWagBbmEleygonum cqnoA26yBca8OZDabFqv/kNQtXSaaSi8HUXptqX2cGcMamayv/PL4VUW2ld1GyPr R3e2PLmgh1KqpUt4hxWGfs+YxwdXo9VnqlIGV8e45VV54mxJ4XJ+SpWMaryRfcje HwMSjU1uiIR59aiqjlhjT0KstR4ZEX1kSSLJHlthiq1Wu8pS0Xr+GjVh0MOwEat4 3lBEQ0kpsxtyjsgM5L/Gy0nFMTWaR/I9gt3Sym49fxfVCmV7IkMXrAOKj6HzV4P2 btly/YxXxMQDo4DAxWCfKTgG9DC5HQ0MeS/lIa5vaWuvXva9NFfjseA1IKcI4Ah4 809NLor117o7o251luMlzSxn6MQjnjb5TZDm0w1aMmcdt482wCdkms6EaPWm7g9o lhQcizn2Bsl+dnuABrOx1uW2VCJnxFqCoSejzmksxp62LAPIKZCEmMD51XB9y0Wo zOwl8Et5+3evKwKNFt9UVp1+TJIwWt6r0rZSxukDDsWfVvXoWLb5qJVHlI1Vjuos MNwklnvEfstTrgAupE2GxDKL40V9C/w5iA5H+K1iUbY10zTXGJt0QrhANGgPkUGF kkK3eOKdGiDcHw0LkA8AVP3kJt6dtKo+5U5TaphfG/zOpmVbY7FdyGrtHJR8TI+K r2PshoZdBKJGbRKk1hbszyNhlTxgBjrsRcnn/MEqmHQwjELoOiJpO271muPRoQwu v00HCJlOk61Qu91ziLwCtwZETsutRoBBoftOk/MyK7Vne66dYOqbm2RDV+8a9lpC hRnhVpW5JeWbo3LmFcyfwCzrH/bapADONKD0xv4dhT1S3g/IxI7yXcEKkpALZB4X UBkTKMNG8wnnZicKedhlk866a215G/t3Cp4= Extension name: 2j5k85h2iq ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6647887021D9C3B7

http://decryptor.top/6647887021D9C3B7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6.exe
    "C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4472
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3724
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\2j5k85h2iq-readme.txt

      Filesize

      6KB

      MD5

      9b935e26838a26768318ebaf580d9f61

      SHA1

      968ed216f3c2719fd28fa684f9ac2d697a40179d

      SHA256

      46960391acd6a7e8c3cb3a40b3faab1f9764ed7d6f3c2bef2779121f50a01119

      SHA512

      8fddac2d3ac49f098182993f69413e7ce222695075791cc175a1a6d6e7e0f8180ee67019676915bdbe23c05f8190b1111ae3ec5d07de18a09162db355625ae66

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_paebvxmo.nkg.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4472-5-0x0000021DF3170000-0x0000021DF3192000-memory.dmp

      Filesize

      136KB

    • memory/4472-10-0x00007FFA1A930000-0x00007FFA1B3F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4472-11-0x0000021DF2D00000-0x0000021DF2D10000-memory.dmp

      Filesize

      64KB

    • memory/4472-12-0x0000021DF2D00000-0x0000021DF2D10000-memory.dmp

      Filesize

      64KB

    • memory/4472-13-0x0000021DF2D00000-0x0000021DF2D10000-memory.dmp

      Filesize

      64KB

    • memory/4472-16-0x00007FFA1A930000-0x00007FFA1B3F1000-memory.dmp

      Filesize

      10.8MB