Analysis

  • max time kernel
    90s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 13:51

General

  • Target

    c35f35a9e54f35375bc2f72842d038c4121a5cc6314ac7cbabca6a8dc463cfcd.dll

  • Size

    164KB

  • MD5

    81d10b00af8c31044ea7aa32e4958625

  • SHA1

    2ae88e4d130eb6e57f6b03a8264f11d1a6fdfdcf

  • SHA256

    c35f35a9e54f35375bc2f72842d038c4121a5cc6314ac7cbabca6a8dc463cfcd

  • SHA512

    aabd830b5a342cbb67fbc76afe9d87acf1088b0309d4350b7bc28ba7d214f2cc667a790cba9e6fd283773180daab37e0d42ef4bacccb4ad1a493fa7675f8bb3e

  • SSDEEP

    3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfDPGPWuUgR:veoUeZR2TRCWQFfDGMg

Malware Config

Extracted

Path

C:\Users\82rrs-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 82rrs. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/633CE5B8AB4B7FC2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/633CE5B8AB4B7FC2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: IgEeSEeOpcWmGdGghBGqbY9Ccl50PIOtoh2E48CuEDymuf7rbq3NPhnKCkKSiVzj zpDDu6v47kWaYYn7tx7JaJYk2nVn+tHf5QtJke1fMk3Py8ACeGf9oTsa9f8NfmIG Lo03cDBCg4vC56lvg3dZDI2YFJWrigc8LJXgSVjVN7VLxcDWOkktFE+ycbpDc8TO LrjHTi6J5ED7Tmagy/u7g2FbQLSfOJVAJO4IxklHhVz3Sf27Qfuhj7JrOWELVWgp nojNQFkbcSaspLnF1JW5sxIK3+8rRZDNAAxLoab4R4tKrSxjyrHOvHQ6zOkGlxi2 9hzStpucUfh24UjP+bT2LgPMe9Go4BOFbIvnaHce7QU3727kqHeizv/Bhor2dHPx Cfm+s59YH+AGE7GFq0nDKIz2OIC7sp98dt2qFyUJ+X3SY2Ie9aGmV8jAHgKe7ZuD 6eICGnEFQpsKiqMFBENCIRTAB0rLRqxdDQdu5fgAWNqZBcMa0dBo7wQvyo6VVQVU aCniGpOAf0hlo4dnBD1PTZCT+dlSs6MKQ0BjdIRNQMt97TwmEOYe3nuba7GwUSHD qESHPSrXbep5MbMdzpITW7TNm6KFOWS25RwZxJHYB8fb6lck0ZM5tHv8hxkyCO9e XD+RvKEh8xtaDmzLRb/PPpkrgTN8+XMEZyB2rTACNFDlikOE0QZ/+2Pw/6DqtWyu tDtsJxdaB+DocKbXcMfq/4EvsnXLQURMCs8W/8emsfhbCvmff7D1Bev7cuAk9D/m eVuogYbVHrUtCu0ACK50aG2c2UlYerioIqjKuSZjnYiYQ0/VRqZLBkuZbqCMw38x dV/BRv9tDlBw3SrhqCtnJAtyUP+LC+NyW1a8Fq3iBeGnkn2iBIcL9MF/XZP4GtPi rutVaiDrTraucWz9BuYTRvAluQ6nPlJRDJYbeDwr+N7NmpctQEYYyz7E8ZcbybPN IFND7xi/wKUGGS+d2FBkw/JHrpfBTliNA7QioNUNVTZAjrD1d7XbIR/46IOKbvAi bACGpPcw0p2pSlZrXmZQA1y+irmL6g1kjrNMOhAhMfevGg1aHaR9j04al8mNxJxC 1FtXpAm7RQi2jcJ3hh1YaqCseD2HjFOUTHf9kfx2js+bnmt86mRFN4CP8Qj6pFd7 3vP3puMs4ROkibWPsukE7nhin/nge50jmj8tFGA39rdCc6mhRWWU3P7gdDAg8I61 0mMAcEjXTxmrxxSYylgfCQ== Extension name: 82rrs ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/633CE5B8AB4B7FC2

http://decryptor.cc/633CE5B8AB4B7FC2

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c35f35a9e54f35375bc2f72842d038c4121a5cc6314ac7cbabca6a8dc463cfcd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c35f35a9e54f35375bc2f72842d038c4121a5cc6314ac7cbabca6a8dc463cfcd.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4900
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\82rrs-readme.txt

      Filesize

      6KB

      MD5

      a3afc927c3c8aad451f4d1516c5a27fd

      SHA1

      17ba6af26f14f5c5cb0eb426b6a25a6ddea6ed9d

      SHA256

      2b2588985390bde219aa097914b1e90493613cbfbf86ab79b5ef63ec930a5543

      SHA512

      4e1fd5bdcb990ecb3e7e1f05d65598adefb2d377687d7fd751fdb0ec13bb9b07de8bc02e566ba7fd81de3b73f2777895b92abb881e3a215d63a1ed2419348401

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z4own1ig.tv0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/3276-0-0x00007FFA7A803000-0x00007FFA7A805000-memory.dmp

      Filesize

      8KB

    • memory/3276-1-0x0000021757910000-0x0000021757932000-memory.dmp

      Filesize

      136KB

    • memory/3276-11-0x00007FFA7A800000-0x00007FFA7B2C1000-memory.dmp

      Filesize

      10.8MB

    • memory/3276-12-0x00007FFA7A800000-0x00007FFA7B2C1000-memory.dmp

      Filesize

      10.8MB

    • memory/3276-15-0x00007FFA7A800000-0x00007FFA7B2C1000-memory.dmp

      Filesize

      10.8MB