Analysis

  • max time kernel
    154s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:33

General

  • Target

    0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe

  • Size

    207KB

  • MD5

    7a005a4354bc8b642c89ed08e56be40c

  • SHA1

    e6d2f97b882321bd7cd179fe6ca2404dac13c5f5

  • SHA256

    0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490

  • SHA512

    0a3b01a42d4fd70dddeb3eb778135c8dab8799787d2193f62152fbb607f125e92f1ccf5467c0896794b7a704321fe21712429283768f32dc960a9dc85863cf55

Malware Config

Extracted

Path

C:\j8rr6bu-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension j8rr6bu. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F7494BF32E41A2BE 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F7494BF32E41A2BE Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: hhDvpQ/DA8EO1TOjfsjPklm5cdujWHSQSyfcGo36nfoGKCOi1qx3xAnpqVIfGt5f MV/zLdj3iweXwpuz0RBQqpq47QqlLd2u23ZryIFGPFyvvP+gqVw5ODAoQRot8qzG rVFoOiQTbgFCx8TjmVXKUe57rtZPat+X2b0s9RziD9J/pWAnFv4reXMepOqQkpaN LUALyoANe7/hOJvrnR9y0ATfUQf5Z/p59OjZeHvhy1r2M5A45V1wU6l8PICTFkBK aA0CntaGTC++cTdR5qa7l+/kOiGhuGKQVtqoGhVops5hSjXebmmMYpYkIJ5YAmna i6cutPyW5eXsnlj1MOe9CpBfrkk+apQoHBUVWJ7rKvyAj9y9V4byzp9CmxDRB3zI JtzI89vRGphwLgCRaikFF1GpeFe7ogsb6uR4uAye3LG9wY/xu+cUsH59WNfm8aes 8bNTYVnaHe3EkzNFXO6qf0YW5zA4psd1ma8gMoOFj06C4dfo8/jbPpnqgbPqgsfC EZCrKDRKmAytQhRCWm/j+iJ2miIxs5iVYFFtuNI0bXsj96vsz6pBLNn97AWmPw59 CY0yo86eH41ecPyUsoE0ndhuCLfnscP0qhfghDo0YYd/tz25qmD2P6Sqpreh3ee0 AxV9YnNDkuyxtz0BLebZjoZhVwY5FPLu6M1VmQ323aaIV+bFoXD2b2X1V7Aj9BY/ 507bSeBhyf2dzAy8uoRSi1YZxmNgGusPLstH1sG0vuSDuw3rnqOW369n8dlEQOnv nIsw4vlZDQsSGolndQwW19Y8VxX48ReMDj8urloKpeEI1T2Y1wZ9++5I61CMf5qi SOGb4KaMakzEceDLYKAjYrINvdR97VfVU+h6AVPXWx79/Zso2l3vu/Ok2nQhxKr0 1almyVKNUZPayd53ArzEbg8YAPiCBBp1bEKZCaYY5JUJnUn4JF812TKCbRkPCI1J 2i2mq9ldjrWAi+88/o3RI2u/TuvFWWOOt1b75BTsPvkAopiQgX+cQQ9oCcRBPsj1 TiG9l2BlnFXwumXIspwBiNQ4iVSScZRcQ20eHyq8ImtLh7LcqSCVNdXSkDRydEYu PKPcR1nQl/rsMpIDp7fpr/99xIb2LgNB/OPJHT6dlG15PCOHQsCMt2gWVKAqfCii u5PH5pBRJ3BIoKoJRo/XwvP08EaAp6c6yklqEHMt+F1IJ5u1Pg9FUsOuZ1coRrrQ RYHoeKYrjiYSkbqf3TjNw1XlNvpK53f5qeiKQEjbLLu4j/4n7TIKkI0+v2KaN1I7 JiBA57UO1pVNsixKuXyOGxvp ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F7494BF32E41A2BE

http://decryptor.cc/F7494BF32E41A2BE

Extracted

Family

sodinokibi

Botnet

$2a$10$5KaQAyoiS3CGUdrH8D6rAumvxBhzJQHXxeNGOzzwHleZRUD4sZCXq

Campaign

3181

C2

euro-trend.pl

gopackapp.com

paradicepacks.com

stemenstilte.nl

humanityplus.org

thaysa.com

milltimber.aberdeen.sch.uk

bouldercafe-wuppertal.de

ledmes.ru

tetinfo.in

homecomingstudio.com

charlesreger.com

plotlinecreative.com

alvinschwartz.wordpress.com

fibrofolliculoma.info

stormwall.se

aurum-juweliere.de

ikads.org

stefanpasch.me

id-vet.com

Attributes
  • net

    true

  • pid

    $2a$10$5KaQAyoiS3CGUdrH8D6rAumvxBhzJQHXxeNGOzzwHleZRUD4sZCXq

  • prc

    winword

    firefox

    ocssd

    thunderbird

    infopath

    agntsvc

    encsvc

    dbeng50

    visio

    mydesktopqos

    msaccess

    mydesktopservice

    excel

    sqbcoreservice

    xfssvccon

    synctime

    steam

    onenote

    dbsnmp

    isqlplussvc

    tbirdconfig

    outlook

    ocomm

    sql

    thebat

    ocautoupds

    mspub

    oracle

    wordpad

    powerpnt

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3181

  • svc

    mepocs

    backup

    vss

    sophos

    svc$

    veeam

    sql

    memtas

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
    "C:\Users\Admin\AppData\Local\Temp\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Adds Run key to start application
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2896
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1480

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Change Default File Association

    1
    T1042

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      MD5

      6844bdb8fc61ede9a4ad6122721c8c71

      SHA1

      19f0c1511b39be9951a2e9180721748cb3ccd389

      SHA256

      926a003f4877c7a6388cf753dd4c392902fb1fe9c1ce17151446e8056b55b0d1

      SHA512

      6f1a36e723a2d280458beabd77b7377796bfaf8059019b0160af1ecce190adbed8e991e5f8016a5c2ed92d26f6b6132149f1412a5c3216e6b7a8756b2c8c88e6

    • C:\Users\Admin\AppData\Local\Temp\3582-490\0bba6bf82ae7fde3f9f1e2a70d8603b9a155defda4f0fdd000cfeeeda1e98490.exe
      MD5

      6844bdb8fc61ede9a4ad6122721c8c71

      SHA1

      19f0c1511b39be9951a2e9180721748cb3ccd389

      SHA256

      926a003f4877c7a6388cf753dd4c392902fb1fe9c1ce17151446e8056b55b0d1

      SHA512

      6f1a36e723a2d280458beabd77b7377796bfaf8059019b0160af1ecce190adbed8e991e5f8016a5c2ed92d26f6b6132149f1412a5c3216e6b7a8756b2c8c88e6

    • memory/2620-121-0x00000234C6360000-0x00000234C6382000-memory.dmp
      Filesize

      136KB

    • memory/2620-123-0x00000234C6210000-0x00000234C6220000-memory.dmp
      Filesize

      64KB

    • memory/2620-125-0x00000234C6210000-0x00000234C6220000-memory.dmp
      Filesize

      64KB

    • memory/2620-127-0x00000234DF020000-0x00000234DF096000-memory.dmp
      Filesize

      472KB