Analysis
-
max time kernel
4294180s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05-03-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe
Resource
win10v2004-en-20220112
General
-
Target
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe
-
Size
119KB
-
MD5
53665ee039f02304c7c3d74b75feb9cc
-
SHA1
1762e80d5e968fd75f66936fcc1037ab47daa3b1
-
SHA256
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2
-
SHA512
76987b1367051047009b371374052a6f313aa7eca0861bf4335d2523d22322bb342197f429d5b3f6906d93521f7bd8a3f6e98c3d4221172bc36a9939594b497d
Malware Config
Extracted
C:\q3j199dp-README.txt
http://2xultdmexzfolaylojzgucu53aynvs6d7igkgeky3diw5rml3w6plpid.onion/post/51b8300fae856b17786a1ca7aa7a7654b6ca2e74941d8f5369b54147fed32000
http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion
Extracted
sodinokibi
$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6
67
-
net
false
-
pid
$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6
-
prc
vsnapvss
EnterpriseClient
firefox
infopath
cvd
tv_x64.exe
VeeamTransportSvc
steam
encsvc
mydesktopservice
outlook
synctime
ocssd
SAP
cvfwd
bengien
vxmon
bedbh
ocomm
ocautoupds
raw_agent_svc
oracle
disk+work
powerpnt
saposcol
sqbcoreservice
sapstartsrv
beserver
saphostexec
dbeng50
isqlplussvc
CVODS
DellSystemDetect
CVMountd
TeamViewer.exe
dbsnmp
thunderbird
mspub
wordpad
visio
benetns
QBCFMonitorService
TeamViewer_Service.exe
tv_w32.exe
QBIDPService
winword
thebat
VeeamDeploymentSvc
avagent
QBDBMgrN
mydesktopqos
xfssvccon
sql
tbirdconfig
CagService
pvlsvr
avscc
VeeamNFSSvc
onenote
excel
msaccess
agntsvc
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-README.txt and follow instuctions
-
ransom_template
Hello, Grenergy! [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. If you decline to pay, your files will be published in our blog http://2xultdmexzfolaylojzgucu53aynvs6d7igkgeky3diw5rml3w6plpid.onion/post/51b8300fae856b17786a1ca7aa7a7654b6ca2e74941d8f5369b54147fed32000 [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
-
sub
67
-
svc
QBCFMonitorService
thebat
dbeng50
winword
dbsnmp
VeeamTransportSvc
disk+work
TeamViewer_Service.exe
firefox
QBIDPService
steam
onenote
CVMountd
cvd
VeeamDeploymentSvc
VeeamNFSSvc
bedbh
mydesktopqos
avscc
infopath
cvfwd
excel
beserver
powerpnt
mspub
synctime
QBDBMgrN
tv_w32.exe
EnterpriseClient
msaccess
ocssd
mydesktopservice
sqbcoreservice
CVODS
DellSystemDetect
oracle
ocautoupds
wordpad
visio
SAP
bengien
TeamViewer.exe
agntsvc
CagService
avagent
ocomm
outlook
saposcol
xfssvccon
isqlplussvc
pvlsvr
sql
tbirdconfig
vxmon
benetns
tv_x64.exe
encsvc
sapstartsrv
vsnapvss
raw_agent_svc
thunderbird
saphostexec
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exedescription ioc process File renamed C:\Users\Admin\Pictures\RequestClear.tif => \??\c:\users\admin\pictures\RequestClear.tif.q3j199dp e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\users\admin\pictures\PopInitialize.tiff e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File renamed C:\Users\Admin\Pictures\CopySkip.png => \??\c:\users\admin\pictures\CopySkip.png.q3j199dp e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File renamed C:\Users\Admin\Pictures\ExitExport.tif => \??\c:\users\admin\pictures\ExitExport.tif.q3j199dp e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File renamed C:\Users\Admin\Pictures\PopInitialize.tiff => \??\c:\users\admin\pictures\PopInitialize.tiff.q3j199dp e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exedescription ioc process File opened (read-only) \??\A: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\J: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\K: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\P: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\T: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\B: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\L: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\N: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\R: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\U: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\V: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\W: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\Z: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\F: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\G: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\M: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\O: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\Q: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\S: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\D: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\E: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\H: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\I: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\X: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened (read-only) \??\Y: e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28y.bmp" e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe -
Drops file in Program Files directory 38 IoCs
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exedescription ioc process File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\q3j199dp-README.txt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\UnregisterResume.otf e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\q3j199dp-README.txt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File created \??\c:\program files\q3j199dp-README.txt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\FindSubmit.7z e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ReceiveRead.docx e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ResetDeny.m4v e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\RestartPop.ps1xml e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\AddGrant.svg e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ConvertSwitch.sql e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\RemoveRepair.xla e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\SkipBlock.htm e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\UndoPush.pot e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\DenyPush.wmx e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\EnableRead.rle e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\OutDismount.mpeg3 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\SetRead.dxf e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ConvertFromUnregister.xltm e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\DebugDisable.ttc e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\HideProtect.3g2 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\RedoTest.rar e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\StopSend.wm e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\CompleteUse.vstx e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\PushHide.ADT e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\StopStep.M2TS e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\UpdateResume.rm e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File created \??\c:\program files (x86)\q3j199dp-README.txt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\DisableUndo.jtx e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\MergeShow.csv e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\RenameUnpublish.m4v e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ShowConnect.xla e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\RestartRedo.vb e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\q3j199dp-README.txt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\EnterRename.ppt e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\GrantExpand.ppsx e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\MountDismount.wdp e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\MoveCompress.rar e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe File opened for modification \??\c:\program files\ProtectUnlock.reg e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exepowershell.exepid process 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe 536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeBackupPrivilege 1260 vssvc.exe Token: SeRestorePrivilege 1260 vssvc.exe Token: SeAuditPrivilege 1260 vssvc.exe Token: SeTakeOwnershipPrivilege 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exedescription pid process target process PID 804 wrote to memory of 536 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe powershell.exe PID 804 wrote to memory of 536 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe powershell.exe PID 804 wrote to memory of 536 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe powershell.exe PID 804 wrote to memory of 536 804 e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe"C:\Users\Admin\AppData\Local\Temp\e8cf5d5825e19d3a92a8d81cc86eb03d2eebb18d333dcec743b04769257071a2.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1444
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/536-56-0x000007FEFC4A1000-0x000007FEFC4A3000-memory.dmpFilesize
8KB
-
memory/536-57-0x000007FEEF870000-0x000007FEF03CD000-memory.dmpFilesize
11.4MB
-
memory/536-58-0x000007FEF6060000-0x000007FEF69FD000-memory.dmpFilesize
9.6MB
-
memory/536-59-0x00000000025D0000-0x00000000025D2000-memory.dmpFilesize
8KB
-
memory/536-62-0x00000000025D4000-0x00000000025D7000-memory.dmpFilesize
12KB
-
memory/536-61-0x00000000025D2000-0x00000000025D4000-memory.dmpFilesize
8KB
-
memory/536-60-0x000007FEF6060000-0x000007FEF69FD000-memory.dmpFilesize
9.6MB
-
memory/536-63-0x00000000025DB000-0x00000000025FA000-memory.dmpFilesize
124KB
-
memory/804-54-0x00000000762A1000-0x00000000762A3000-memory.dmpFilesize
8KB
-
memory/804-55-0x0000000000020000-0x0000000000040000-memory.dmpFilesize
128KB