Analysis

  • max time kernel
    143s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 01:17

General

  • Target

    b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6.exe

  • Size

    147KB

  • MD5

    8b3b88fd1b5be958d3abd1367c82f6d1

  • SHA1

    17bf4483fff749b0f436d7984ef5be83abafbc49

  • SHA256

    b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6

  • SHA512

    2b3a1eebe6aaf7f3a3e6162ce43475b3e482b99ee8991b99fdf0f30e283335386ba82872ef7f0ce4ab043806e7df5837a187e9685ad8381767997d2a813b681f

Malware Config

Extracted

Path

C:\xmxn203r05-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion xmxn203r05. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/012CA64B4B10D099 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/012CA64B4B10D099 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: tuId8QgitcmHvdGV5+EaVxN03FWLBMmPKn31LVVSN6BzrE42b8+gdp5S3LZt7PZu jva79SGe97ypNo55YPwHodM7C4fXSiJQ89Og2ETPulVg+UrJfy9wT3SGW+4MKyLF TKH7OjfwasFCWW8az+i9blEPEh1NmxQJex9g3TM98ZY0wN3m9caHvhfdaaoUlD43 tK7KQNZTQMRIji3PdmXAX+t8Fp5zmPb38RCbJeY/fTAxRFRSM1VuJRrd87Pcvuql GkS4jK++FxzpC1x5uK7iBwOoHi8Wxeg3v7OunE8skL4Nc1vqbU7T8vzJe2l5UIS+ dwNNuwbovxndACN40D/7UwkpiYy+be8jjwpjBp09ASpkJvmbwmMHukYmaBhKQDMy yCB1BmN1KIh/e8paGkFeEbsvlvIagu44M+Id2uPlKa3QgUvVlgF0+qBieh9QFk8H kVqJZ+EL10utzmb/+8cpvcw4j98qEU/24OkKTdwsYd4tAELs8bt4u538F3aJ2/AL VHWQy+taHfUfKHhJLfzZGKClHvK39UOwMhph6Y/4+VrUP1Rm6nTd+R1COhldJBS/ 8i/2yzv862JGeALY/Z0zUqa5PG6w5iRyh4dSOAot0iKb//oL32PwPzOEerc9oAvk 14+8r8Ktof4As0kBy3Uw/NK8MQml7BBeULgsthZBCcERPhvuifHFKXNJnwf5TvKi dIf3jBecCW39JcrcgiaznD65cymcIx5Gb/G4wCm3qZkJl9z1O4c1sAmdr0HbeQha 8oM2l2V/dfPJtta53Up4djUghvW5W0aG/x+PC8Ub2h76dxS0xBS+42H4IihNQxAn Hyc3bFYfjGwFkPPG0A02D5MblgdKSQYB/fW04hx6zLGUNvXWujsfMpwtCOSvZlKh WhPl1n+6hlc81Iog+Q8/kYN4Zc+TSO9VvPx/1gLTiOYrxV6Js0GccZXwYaQOssYI flzrbm7O1oKBqDtGkbJj9VRnAQCs9LXts5M0ilSIk3/ZJyXvbKBHe3SODsJAdBKq 7OIlGnZ89bkaHlwco3KCbJcj17uUvrvcUkP6esIZmzahUwYdaGZJB8smHoJLHSpU ZAn/iAt/cq9Dx3zK86KsgHMnrI951806Z+9b5Fn1qXBT1+r3wcYb44YVHD6OqWUL zJLZpS4ff0rIn0kWXgax7aqpYxT07xwn3yv8KZWZ1kw3rWQHonWTE5jhhLY8jYaC kY08zfoWUr8hy+eTANeLS/1PnVEHQPzu3z7kmeAd/CpSXO7xASQG4XhDOGxcf8iS IAntOrZja7bH0OhafquW/i127bTm34izX1QSrGk2Sz4= Extension name: xmxn203r05 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/012CA64B4B10D099

http://decryptor.cc/012CA64B4B10D099

Extracted

Family

sodinokibi

Botnet

$2a$10$R6jfdY.02Ns/TL60z.A74O5Dw8.5EqXA63YzUP5X2NSO0l.4y0Gfa

Campaign

1428

C2

firstpaymentservices.com

krcove-zily.eu

softsproductkey.com

naturavetal.hr

corelifenutrition.com

leda-ukraine.com.ua

beaconhealthsystem.org

acomprarseguidores.com

extraordinaryoutdoors.com

mardenherefordshire-pc.gov.uk

stopilhan.com

triggi.de

anteniti.com

aunexis.ch

boosthybrid.com.au

bee4win.com

gadgetedges.com

tandartspraktijkheesch.nl

8449nohate.org

simoneblum.de

Attributes
  • net

    true

  • pid

    $2a$10$R6jfdY.02Ns/TL60z.A74O5Dw8.5EqXA63YzUP5X2NSO0l.4y0Gfa

  • prc

    excel

    mydesktopservice

    sqlwriter

    ocomm

    powerpnt

    oracle

    mydesktopqos

    ocautoupds

    ocssd

    encsvc

    mysqld_opt

    msaccess

    visio

    agntsvc

    winword

    sqlservr

    tbirdconfig

    wordpad

    xfssvccon

    msftesql

    firefoxconfig

    dbsnmp

    onenote

    thunderbird

    outlook

    isqlplussvc

    dbeng50

    mspub

    thebat64

    sqbcoreservice

    synctime

    sqlbrowser

    steam

    sqlagent

    infopath

    mysqld

    mysqld_nt

    thebat

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    1428

  • svc

    vss

    mepocs

    veeam

    svc$

    backup

    sophos

    memtas

    sql

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6.exe
    "C:\Users\Admin\AppData\Local\Temp\b1d144a7df0d9cee58bb6222683cef1d01ff57334383da35918e5615e24de7e6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\proc.exe
      "proc.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Adds Run key to start application
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:524
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:556
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2036

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\proc.exe
      MD5

      b5d3505a5533c63d9e12b4ee1487febb

      SHA1

      546c127f4957aa32bf7c5f00086cea4fc3da7cf1

      SHA256

      dc732c1ebfd20e219236289f1815830abd704bc340e8e35966754666c1a2cd01

      SHA512

      2a49a7fa24300b090bc7bb44485e3072dbd7e773e9bcf7ed0f622e113856de70c4f30faf135f0bf490e6e2e3598c75162bd1b5dfd17fbd2e41e548967ff2f53a

    • memory/524-56-0x000007FEFC2B1000-0x000007FEFC2B3000-memory.dmp
      Filesize

      8KB

    • memory/524-58-0x0000000002740000-0x0000000002742000-memory.dmp
      Filesize

      8KB

    • memory/524-59-0x0000000002742000-0x0000000002744000-memory.dmp
      Filesize

      8KB

    • memory/524-60-0x0000000002744000-0x0000000002747000-memory.dmp
      Filesize

      12KB

    • memory/524-57-0x000007FEF3680000-0x000007FEF41DD000-memory.dmp
      Filesize

      11.4MB

    • memory/524-61-0x000000000274B000-0x000000000276A000-memory.dmp
      Filesize

      124KB

    • memory/892-55-0x0000000076451000-0x0000000076453000-memory.dmp
      Filesize

      8KB