Analysis
-
max time kernel
78s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
full.enc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
full.enc.exe
Resource
win10v2004-20220812-en
General
-
Target
full.enc.exe
-
Size
121KB
-
MD5
fa1b150ec4130c49486338149678b19f
-
SHA1
a6795b072c6817078c122ab6aed99695602d047f
-
SHA256
5e9730afe5cd839e717f130be156c12ae2d7dd4d91116963eefc48b04eb83663
-
SHA512
5df6c3c69c44c4bca51f427980c424b4fbb830e087b5866f5f35ff4b91c3c39c502f46133509b94c4fd0bf8616cc1732db1259992a2f19f214751c069149a952
-
SSDEEP
3072:6WcHSdO86ssy11HUvfFJYZzJvCuv54sfVzo5016R:6wdDHHUFOquvdVzrW
Malware Config
Extracted
C:\g134d8z9-README.txt
http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion
Extracted
sodinokibi
$2b$13$SmHroaooPkDhdonL/MU1F.NGQdxCRizVxx5jGju1EP6jZPd9Z7w6O
143
-
net
false
-
pid
$2b$13$SmHroaooPkDhdonL/MU1F.NGQdxCRizVxx5jGju1EP6jZPd9Z7w6O
-
prc
vsnapvss
EnterpriseClient
firefox
infopath
cvd
tv_x64.exe
VeeamTransportSvc
steam
encsvc
mydesktopservice
outlook
synctime
ocssd
SAP
cvfwd
bengien
vxmon
bedbh
ocomm
ocautoupds
raw_agent_svc
oracle
disk+work
powerpnt
saposcol
sqbcoreservice
sapstartsrv
beserver
saphostexec
dbeng50
isqlplussvc
CVODS
DellSystemDetect
CVMountd
TeamViewer.exe
dbsnmp
thunderbird
mspub
wordpad
visio
benetns
QBCFMonitorService
TeamViewer_Service.exe
tv_w32.exe
QBIDPService
winword
thebat
VeeamDeploymentSvc
avagent
QBDBMgrN
mydesktopqos
xfssvccon
sql
tbirdconfig
CagService
pvlsvr
avscc
VeeamNFSSvc
onenote
excel
msaccess
agntsvc
-
ransom_oneliner
Follow {EXT}-README.txt instructions
-
ransom_template
=== Welcome to LV === [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] ATTENTION. YOUR DATA 1000 GB IS LEAKED [+] All your important documents was downloaded. Data leaked includes: - Databases - Insurances - Finance - Employee data - Clients data - and more more more... If you do not contact us within 72 hours, the incident will appear on a public blog read by the WORLD media. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!!
-
sub
143
-
svc
QBCFMonitorService
thebat
dbeng50
winword
dbsnmp
VeeamTransportSvc
disk+work
TeamViewer_Service.exe
firefox
QBIDPService
steam
onenote
CVMountd
cvd
VeeamDeploymentSvc
VeeamNFSSvc
bedbh
mydesktopqos
avscc
infopath
cvfwd
excel
beserver
powerpnt
mspub
synctime
QBDBMgrN
tv_w32.exe
EnterpriseClient
msaccess
ocssd
mydesktopservice
sqbcoreservice
CVODS
DellSystemDetect
oracle
ocautoupds
wordpad
visio
SAP
bengien
TeamViewer.exe
agntsvc
CagService
avagent
ocomm
outlook
saposcol
xfssvccon
isqlplussvc
pvlsvr
sql
tbirdconfig
vxmon
benetns
tv_x64.exe
encsvc
sapstartsrv
vsnapvss
raw_agent_svc
thunderbird
saphostexec
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
full.enc.exedescription ioc process File opened for modification \??\c:\users\admin\pictures\SendSync.tiff full.enc.exe File renamed C:\Users\Admin\Pictures\GroupResolve.png => \??\c:\users\admin\pictures\GroupResolve.png.g134d8z9 full.enc.exe File renamed C:\Users\Admin\Pictures\LockInitialize.png => \??\c:\users\admin\pictures\LockInitialize.png.g134d8z9 full.enc.exe File renamed C:\Users\Admin\Pictures\LockBackup.raw => \??\c:\users\admin\pictures\LockBackup.raw.g134d8z9 full.enc.exe File renamed C:\Users\Admin\Pictures\HideApprove.png => \??\c:\users\admin\pictures\HideApprove.png.g134d8z9 full.enc.exe File renamed C:\Users\Admin\Pictures\SendSync.tiff => \??\c:\users\admin\pictures\SendSync.tiff.g134d8z9 full.enc.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
full.enc.exedescription ioc process File opened (read-only) \??\S: full.enc.exe File opened (read-only) \??\Y: full.enc.exe File opened (read-only) \??\D: full.enc.exe File opened (read-only) \??\G: full.enc.exe File opened (read-only) \??\M: full.enc.exe File opened (read-only) \??\O: full.enc.exe File opened (read-only) \??\P: full.enc.exe File opened (read-only) \??\T: full.enc.exe File opened (read-only) \??\W: full.enc.exe File opened (read-only) \??\B: full.enc.exe File opened (read-only) \??\F: full.enc.exe File opened (read-only) \??\J: full.enc.exe File opened (read-only) \??\Q: full.enc.exe File opened (read-only) \??\R: full.enc.exe File opened (read-only) \??\A: full.enc.exe File opened (read-only) \??\E: full.enc.exe File opened (read-only) \??\H: full.enc.exe File opened (read-only) \??\I: full.enc.exe File opened (read-only) \??\V: full.enc.exe File opened (read-only) \??\X: full.enc.exe File opened (read-only) \??\Z: full.enc.exe File opened (read-only) \??\K: full.enc.exe File opened (read-only) \??\L: full.enc.exe File opened (read-only) \??\N: full.enc.exe File opened (read-only) \??\U: full.enc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
full.enc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6beua3b4qt1c8.bmp" full.enc.exe -
Drops file in Program Files directory 21 IoCs
Processes:
full.enc.exedescription ioc process File created \??\c:\program files (x86)\g134d8z9-README.txt full.enc.exe File opened for modification \??\c:\program files\DismountComplete.xls full.enc.exe File opened for modification \??\c:\program files\InitializeWrite.mht full.enc.exe File opened for modification \??\c:\program files\PingSwitch.au3 full.enc.exe File opened for modification \??\c:\program files\ResolveOpen.wma full.enc.exe File opened for modification \??\c:\program files\SelectReceive.vdx full.enc.exe File created \??\c:\program files\g134d8z9-README.txt full.enc.exe File opened for modification \??\c:\program files\FormatRevoke.dib full.enc.exe File opened for modification \??\c:\program files\ProtectBlock.mp4 full.enc.exe File opened for modification \??\c:\program files\RegisterDeny.vsx full.enc.exe File opened for modification \??\c:\program files\ResumeEnable.tif full.enc.exe File opened for modification \??\c:\program files\RevokeRequest.vst full.enc.exe File opened for modification \??\c:\program files\RevokeSelect.wma full.enc.exe File opened for modification \??\c:\program files\DismountResume.svg full.enc.exe File opened for modification \??\c:\program files\InvokeEdit.vb full.enc.exe File opened for modification \??\c:\program files\PingStop.mp2 full.enc.exe File opened for modification \??\c:\program files\GroupLimit.M2TS full.enc.exe File opened for modification \??\c:\program files\ImportRedo.xltx full.enc.exe File opened for modification \??\c:\program files\ProtectPing.dwfx full.enc.exe File opened for modification \??\c:\program files\StopSuspend.cr2 full.enc.exe File opened for modification \??\c:\program files\ApproveConfirm.jpg full.enc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
full.enc.exepid process 1888 full.enc.exe 1888 full.enc.exe 1888 full.enc.exe 1888 full.enc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
full.enc.exevssvc.exedescription pid process Token: SeDebugPrivilege 1888 full.enc.exe Token: SeTakeOwnershipPrivilege 1888 full.enc.exe Token: SeBackupPrivilege 4816 vssvc.exe Token: SeRestorePrivilege 4816 vssvc.exe Token: SeAuditPrivilege 4816 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\full.enc.exe"C:\Users\Admin\AppData\Local\Temp\full.enc.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4924
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4708
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\g134d8z9-README.txt1⤵PID:1928
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\RequestConvertTo.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:3992
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\PingDebug.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:3788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a97a9c0e1c569c41a0c3950689700c5e
SHA1b7f07d1fef9a4ab6f5baa1f1a2374647db4b8f61
SHA2565549d33e34e4a458662dd1d5dc27782fe80b22eb81736f488a423ee0d54635af
SHA51224a82f8d83bd73979cb4d5ef86a4c4319caa2576dbea27360cef6d7a73d2648cfbd2d51b42eb9e8fec6721b64a6ac170b4423a8ed74cf840fc65a199da604486