Analysis

  • max time kernel
    152s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 02:33

General

  • Target

    0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe

  • Size

    207KB

  • MD5

    7a005a4354bc8b642c89ed08e56be40c

  • SHA1

    e6d2f97b882321bd7cd179fe6ca2404dac13c5f5

  • SHA256

    0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490

  • SHA512

    0a3b01a42d4fd70dddeb3eb778135c8dab8799787d2193f62152fbb607f125e92f1ccf5467c0896794b7a704321fe21712429283768f32dc960a9dc85863cf55

Malware Config

Extracted

Path

C:\hl6622-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension hl6622. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B10AEDC896F64C1F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B10AEDC896F64C1F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: QkUxXeXX/FypF7dvQs33xoVNY5wxzXDSXJbEdl09r3MoFfiDJ/1LEAaZCfFzEjZN S8CIN2v0EbeWkmlOD8Ek2E4sIzDzR1E20YeawLvQgqmbxKBkSqHlJbf6sScKP/H+ gKsk4Yj9YRBpAquMMS5qQoNmO//2JVjUsV8MPbFmLwWku9glMt8J5plLmZI4cQQP JPq09IBPsZEBO70OhkntHKSG/emEx0qpkiJAexKyeuC7xmlCdHubdcz6zjrGzo0N k/Gkn1KLYZ3hVUtx5dEXN1j8jvNn/rZ+yTQix2E5r9CGG7pRvvPBtNH+l7nWF+sc OULYIGYIfDVIUUCv01fY1HvNmyT/wV7HHgNhT5Ldx5fcgBM/nrW/s/DdvO9XaG5l PdFZ/3h5Gd5fKVfgEjAmlKrnTCI2qcJ9iYHi7Hso1XlK5ma0S4GyGdbkRMCAlNFp nowvGTK+UpeB/zZ7BLAicEkRvRSJ7xN2W1CmSsCkV+MtjorNgG6EHfVoelfCMhWC Qtm1BeerfTY2A2NlJL188Kx5bz9qyVawVgG2vh2YIg9MeqxWVEnfC4Ikq8VIJ787 G7Wvf+xhbsP7MMFFIBwdH4sn2Tk6qm02FFm6+5KkIRJ6B/didPBoLsP+Qx08Je8V j6vwb96m5StWtxW7CRUvk4ko8f6XdRtsosHZl1Gn7ybMdv8NdOfBl+RlJ6G2se42 Gt/Ntt52fRok/AXe3YJAXWK+7xIqF/8F5z7fAv6OJoUB6j3OU+5/p9uIbmXIPBEx W/YritIO8ZwWbG/BOKhQZnAM0WULdrE88LU2VtHID+8rB9bWm5DyxlR80vUdFQdT 9TlpyylwiHVPpVpv5UL0FZ1mDUagqmzyCoNU5FzFrXHg9GI3OZ532hGuVBuXWUWk tW913yeC4qf8bYdQz3MMoASgb584AtgtTpSI3IRRwINOEVQcYkEkWP1q8rbxYes6 ZXrdIDhqha37sgjzGoXRYlwXOTK4rNvG/BVpcV0B6JFJPQNE3khsTCx7drlvmPwA typrd1zdk4Ti/vxM6pniC5RmJ75SFgZil72glAxeC2XnjXrB0zKUgSSCm/lsn0ee LeWJqesag37HVvFHDmfWSD9o5bV0wNckp2J/Maf68JLjdXdjPbJzmqrmO+5e/Hf8 QvkgsLNyhBP9RFiMuSDlymft1a/y//Xhx7GMW2cYymP6fzApQ472XwJw9Lc6OHtU zJe/3jZUGttSrBozwAPPH6SKags+cnBOYJOi55R8zEZG2LQjd93sHbT86U0+MtuB 1UY2cdfN6jAILSX/AY+IbCN3Phm+A5eP ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B10AEDC896F64C1F

http://decryptor.cc/B10AEDC896F64C1F

Extracted

Family

sodinokibi

Botnet

$2a$10$5KaQAyoiS3CGUdrH8D6rAumvxBhzJQHXxeNGOzzwHleZRUD4sZCXq

Campaign

3181

C2

euro-trend.pl

gopackapp.com

paradicepacks.com

stemenstilte.nl

humanityplus.org

thaysa.com

milltimber.aberdeen.sch.uk

bouldercafe-wuppertal.de

ledmes.ru

tetinfo.in

homecomingstudio.com

charlesreger.com

plotlinecreative.com

alvinschwartz.wordpress.com

fibrofolliculoma.info

stormwall.se

aurum-juweliere.de

ikads.org

stefanpasch.me

id-vet.com

Attributes
  • net

    true

  • pid

    $2a$10$5KaQAyoiS3CGUdrH8D6rAumvxBhzJQHXxeNGOzzwHleZRUD4sZCXq

  • prc

    winword

    firefox

    ocssd

    thunderbird

    infopath

    agntsvc

    encsvc

    dbeng50

    visio

    mydesktopqos

    msaccess

    mydesktopservice

    excel

    sqbcoreservice

    xfssvccon

    synctime

    steam

    onenote

    dbsnmp

    isqlplussvc

    tbirdconfig

    outlook

    ocomm

    sql

    thebat

    ocautoupds

    mspub

    oracle

    wordpad

    powerpnt

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3181

  • svc

    mepocs

    backup

    vss

    sophos

    svc$

    veeam

    sql

    memtas

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
    "C:\Users\Admin\AppData\Local\Temp\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1504
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1784
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1820

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    4
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      MD5

      6844bdb8fc61ede9a4ad6122721c8c71

      SHA1

      19f0c1511b39be9951a2e9180721748cb3ccd389

      SHA256

      926a003f4877c7a6388cf753dd4c392902fb1fe9c1ce17151446e8056b55b0d1

      SHA512

      6f1a36e723a2d280458beabd77b7377796bfaf8059019b0160af1ecce190adbed8e991e5f8016a5c2ed92d26f6b6132149f1412a5c3216e6b7a8756b2c8c88e6

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      MD5

      6844bdb8fc61ede9a4ad6122721c8c71

      SHA1

      19f0c1511b39be9951a2e9180721748cb3ccd389

      SHA256

      926a003f4877c7a6388cf753dd4c392902fb1fe9c1ce17151446e8056b55b0d1

      SHA512

      6f1a36e723a2d280458beabd77b7377796bfaf8059019b0160af1ecce190adbed8e991e5f8016a5c2ed92d26f6b6132149f1412a5c3216e6b7a8756b2c8c88e6

    • \Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      MD5

      6844bdb8fc61ede9a4ad6122721c8c71

      SHA1

      19f0c1511b39be9951a2e9180721748cb3ccd389

      SHA256

      926a003f4877c7a6388cf753dd4c392902fb1fe9c1ce17151446e8056b55b0d1

      SHA512

      6f1a36e723a2d280458beabd77b7377796bfaf8059019b0160af1ecce190adbed8e991e5f8016a5c2ed92d26f6b6132149f1412a5c3216e6b7a8756b2c8c88e6

    • memory/1504-60-0x000007FEFBEB1000-0x000007FEFBEB3000-memory.dmp
      Filesize

      8KB

    • memory/1504-61-0x000007FEF30A0000-0x000007FEF3BFD000-memory.dmp
      Filesize

      11.4MB

    • memory/1504-62-0x0000000002700000-0x0000000002702000-memory.dmp
      Filesize

      8KB

    • memory/1504-63-0x0000000002702000-0x0000000002704000-memory.dmp
      Filesize

      8KB

    • memory/1504-64-0x0000000002704000-0x0000000002707000-memory.dmp
      Filesize

      12KB

    • memory/1504-65-0x000000001B7D0000-0x000000001BACF000-memory.dmp
      Filesize

      3.0MB

    • memory/1504-66-0x000000000270B000-0x000000000272A000-memory.dmp
      Filesize

      124KB

    • memory/1588-55-0x0000000075321000-0x0000000075323000-memory.dmp
      Filesize

      8KB