Analysis

  • max time kernel
    131s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 00:41

General

  • Target

    f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe

  • Size

    201KB

  • MD5

    6e64e10abf633d7d99b541819f25f57b

  • SHA1

    71234a62fb0b931103a558e2c34b3cda6a116122

  • SHA256

    f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911

  • SHA512

    a01d438a5289d449758124899989230d5d81930f1787aae90fa962c928ecf433bac7ed37544112199296a37d5f3596c99a099673e55cc21d36d734cc8ba02655

Malware Config

Extracted

Family

sodinokibi

Botnet

19

Campaign

312

C2

iron-mine.ru

qandmmusiccenter.com

yourhappyevents.fr

enews-qca.com

leadforensics.com

lumturo.academy

lovetzuchia.com

sber-biznes.com

randyabrown.com

penumbuhrambutkeiskei.com

johnsonweekly.com

agriturismocastagneto.it

masecologicos.com

jonnyhooley.com

krishnabrawijaya.com

denverwynkoopdentist.com

enactusnhlstenden.com

uci-france.fr

renderbox.ch

dennisverschuur.com

Attributes
  • net

    true

  • pid

    19

  • prc

    ocautoupds.exe

    mysqld_opt.exe

    msftesql.exe

    xfssvccon.exe

    mysqld.exe

    oracle.exe

    agntsvc.exe

    mspub.exe

    thebat.exe

    ocssd.exe

    steam.exe

    mysqld_nt.exe

    powerpnt.exe

    sqlbrowser.exe

    tbirdconfig.exe

    dbeng50.exe

    msaccess.exe

    sqbcoreservice.exe

    outlook.exe

    encsvc.exe

    infopath.exe

    excel.exe

    synctime.exe

    sqlwriter.exe

    thunderbird.exe

    sqlservr.exe

    winword.exe

    dbsnmp.exe

    visio.exe

    onenote.exe

    thebat64.exe

    mydesktopqos.exe

    sqlagent.exe

    firefoxconfig.exe

    ocomm.exe

    wordpad.exe

    mydesktopservice.exe

    isqlplussvc.exe

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    312

Signatures

  • Detect Neshta Payload 17 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi/Revil sample 5 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    "C:\Users\Admin\AppData\Local\Temp\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:360
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\System32\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\SysWOW64\vssadmin.exe
            vssadmin.exe Delete Shadows /All /Quiet
            5⤵
            • Interacts with shadow copies
            PID:876
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1908

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE
    MD5

    eafb5c9e718ec9f053f0262ab1c9ddd2

    SHA1

    573d3cd44bbb7863e0ef5226d90cbd2375282f2a

    SHA256

    56fc9ee5ebfc6b6eec9ef43c21ab24349fc0890eb783b2e1eddaa53770f11877

    SHA512

    e7d6a5efdb35543e1dc940a198119bd0f3ed9740bc36465232a4f66c03cbecbfe61a109f181b758113ce4c71253766698a493763abccc9fb0ce2c47ff8b31d7a

  • C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe
    MD5

    3ec4922dbca2d07815cf28144193ded9

    SHA1

    75cda36469743fbc292da2684e76a26473f04a6d

    SHA256

    0587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801

    SHA512

    956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7

  • C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE
    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe
    MD5

    693ed385cb9c7d902c9aa4271d345d7e

    SHA1

    36f512f61342924f3e4ea8d92badfc0e21e7ebe8

    SHA256

    01e693491511a132443e9aae0b3d8522ff258bb1f47d5d5e9dc0407a24e67eaf

    SHA512

    f31c5b3b02d698fff2b956850cc0d79bbbf2a083bc82fbd406426eac19a598bb5ebae028aecdaddd7010501237f2422fe4e709be91e18368a78995486cfa5cee

  • C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE
    MD5

    ad0efa1df844814c2e8ddc188cb0e3b5

    SHA1

    b1a8a09f2223aab8b8e3e9bc0e58cc83d402f8ab

    SHA256

    c87fd5b223cb6dc716815b442b4964d4670a30b5c79f4fb9f1c3a65ec9072e5a

    SHA512

    532cc173d9ef27098ff10b6b652c64231b4a14f99df3b5de2eb1423370c19590e2a6032023d3ed02e2080f2f087b620ebbbd079e4a47a584ef11f3eaa0eb8520

  • C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE
    MD5

    92724a039ff89fb4dbf81af8de334fef

    SHA1

    076c6a350376748aa51d27ca82ee2b9b530d08f9

    SHA256

    e76511f06efd7f21aebafbbe8bd7deb024b76f10714e06f95b45992df8a847f5

    SHA512

    c8d8ada1492c2881896662bd1e387c3b6408034f49e078f58d1d5a7476af01433c9e35cf123a91b785d5f0284803631c153e9d26895bb61a1ccd19be267b2631

  • C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe
    MD5

    c212b0482724be17efbb38ac9c65f4d0

    SHA1

    b3417fd84d533516288725139952f79afef770a8

    SHA256

    6135f77de811a3da2905ecaa066c4e9195d29f6c1dbe3ab22b1fb910ae567492

    SHA512

    0d30c2b64a8617c1279f0b380dabd2b26400010c26bf757bd131f4eb999ec0fde0e5617d79c910b692227741676ac4c6b5e0d2d077adc09a1098a1f69e8862fe

  • C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE
    MD5

    67a6e518de5b8401669ccf03059f1bac

    SHA1

    98ccf378e8c7e3ada48c4f6ca52b9293e141ce84

    SHA256

    c554dfea900392e9eb4a0ab658f76a5a1de1e41bdce80382b5943dd78fc9516f

    SHA512

    4e7b1922328d1e05e7faf456f61375df081faacca415c5242e12f081dee4d7f03835a9776295c77e7788984188f27ff358d72bc9100dbb250975aaaf2e95777c

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
    MD5

    f6636e7fd493f59a5511f08894bba153

    SHA1

    3618061817fdf1155acc0c99b7639b30e3b6936c

    SHA256

    61720d294189141b74631299911d91874aa02e67096a47cfaf56ef03f568bd33

    SHA512

    bd2ae751a37b4c065f0d7f7f7ec19785c1552dfaa4818fdb213fffcf90b7951886131a2b5d7aad843f714be418383fcf09ba1d9548bdbf38fa3d304a092a33d1

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
    MD5

    07e194ce831b1846111eb6c8b176c86e

    SHA1

    b9c83ec3b0949cb661878fb1a8b43a073e15baf1

    SHA256

    d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

    SHA512

    55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

  • C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE
    MD5

    fa982a173f9d3628c2b3ff62bd8a2f87

    SHA1

    2cfb18d542ae6b6cf5a1223f1a77defd9b91fa56

    SHA256

    bc5d80d05a1bd474cb5160782765bf973ba34ea25dedf7e96dfaf932b9935032

    SHA512

    95ca9066a2e5272494b8e234220b6028c14892679023ca70801475c38d341032363589375ec6ffc4cde3416dd88d0e3082d315f7beddccdf014122ddd0a90644

  • C:\Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    MD5

    7b4c9fa2f95caaf096b15e129623d657

    SHA1

    b4e253782de542a520b55205a019bd0dd6695ed8

    SHA256

    6d484c276965970169270302286bad03d5de1966ae4822873dc4fc8ac5aa8980

    SHA512

    1f0a4287bd10d2915a87cdc921b20ef5ffc9563dd9d774ffe031b35e63158fe61f46df64d712ef8df844119bb1e43ff17b2f377b7a5d1318c6ad6acd41f91a28

  • C:\Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    MD5

    7b4c9fa2f95caaf096b15e129623d657

    SHA1

    b4e253782de542a520b55205a019bd0dd6695ed8

    SHA256

    6d484c276965970169270302286bad03d5de1966ae4822873dc4fc8ac5aa8980

    SHA512

    1f0a4287bd10d2915a87cdc921b20ef5ffc9563dd9d774ffe031b35e63158fe61f46df64d712ef8df844119bb1e43ff17b2f377b7a5d1318c6ad6acd41f91a28

  • C:\Windows\svchost.com
    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    MD5

    7b4c9fa2f95caaf096b15e129623d657

    SHA1

    b4e253782de542a520b55205a019bd0dd6695ed8

    SHA256

    6d484c276965970169270302286bad03d5de1966ae4822873dc4fc8ac5aa8980

    SHA512

    1f0a4287bd10d2915a87cdc921b20ef5ffc9563dd9d774ffe031b35e63158fe61f46df64d712ef8df844119bb1e43ff17b2f377b7a5d1318c6ad6acd41f91a28

  • \Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    MD5

    7b4c9fa2f95caaf096b15e129623d657

    SHA1

    b4e253782de542a520b55205a019bd0dd6695ed8

    SHA256

    6d484c276965970169270302286bad03d5de1966ae4822873dc4fc8ac5aa8980

    SHA512

    1f0a4287bd10d2915a87cdc921b20ef5ffc9563dd9d774ffe031b35e63158fe61f46df64d712ef8df844119bb1e43ff17b2f377b7a5d1318c6ad6acd41f91a28

  • \Users\Admin\AppData\Local\Temp\3582-490\f8d022d707843f03a50e7ec12120c51b7f1521b8ae0f3e2138abfceacb122911.exe
    MD5

    7b4c9fa2f95caaf096b15e129623d657

    SHA1

    b4e253782de542a520b55205a019bd0dd6695ed8

    SHA256

    6d484c276965970169270302286bad03d5de1966ae4822873dc4fc8ac5aa8980

    SHA512

    1f0a4287bd10d2915a87cdc921b20ef5ffc9563dd9d774ffe031b35e63158fe61f46df64d712ef8df844119bb1e43ff17b2f377b7a5d1318c6ad6acd41f91a28

  • memory/960-54-0x0000000075D11000-0x0000000075D13000-memory.dmp
    Filesize

    8KB

  • memory/964-67-0x0000000000110000-0x0000000000111000-memory.dmp
    Filesize

    4KB

  • memory/964-68-0x0000000000120000-0x0000000000126000-memory.dmp
    Filesize

    24KB

  • memory/964-65-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/964-64-0x00000000000E0000-0x00000000000EA000-memory.dmp
    Filesize

    40KB

  • memory/964-62-0x0000000000380000-0x000000000039F000-memory.dmp
    Filesize

    124KB

  • memory/964-61-0x0000000002320000-0x000000000244D000-memory.dmp
    Filesize

    1.2MB

  • memory/964-60-0x0000000000AA0000-0x0000000000B3F000-memory.dmp
    Filesize

    636KB

  • memory/964-66-0x0000000000100000-0x0000000000101000-memory.dmp
    Filesize

    4KB

  • memory/964-63-0x00000000026D0000-0x00000000027D9000-memory.dmp
    Filesize

    1.0MB