Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 04:03

General

  • Target

    457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c.exe

  • Size

    121KB

  • MD5

    6f0b92488eae3ccefc0db7a6b0d652ee

  • SHA1

    45adc4224d2ae9fd75b19417ca6913515c5222ee

  • SHA256

    457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c

  • SHA512

    14bc82aa8f60eed63725e0da0f51321c5eeefd680887ac76d47f3b6b023b00aa8e40ae7c147e3b6e26e7592ae3db37513d518be20c69dc575fd7e48b06a656bc

  • SSDEEP

    3072:6WcHSdO86ssy11HUvfFJYImsquDv54sfVzo5016R:6wdDHHUFzquvdVzrW

Malware Config

Extracted

Path

C:\of63j0u-README.txt

Ransom Note
=== Welcome to DarkSide === [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have of63j0u extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion When you visit our website, put the following data into the input form: Key: zKM1F7Fl6zb1z5J8fNQql8pI1/F8peVlq75NUgg5/myZFap7xK7aj9VImtAuW/Yf 0+cvHiA9S8L/bHz9AW/fds2gqiMNnohv8AZwGF9ELyIw4y4VV/wavF6BKpGJQbwo NvWby5kXqo2juACnqxOuc6BajuzlojzfpF15cmlG+CcSmV9GJZqjwMze4iFnGG9o 8c0H7ULsnAmn2TaT+VKODSQMU539gp3DNwmhLrI6pNISB81gwhu8AQOgvDBH7eQP 3Mzm7EqZlTjPSerE7Pinp0vj6XELUFPuNCAg+OSZf9/01wIfOevO8EKP14x0ApMX /F3nrS1TFQmkdAVpzrzco03p8bdRbFGb+PggTBPWSlHULgqPUBU+MEIZvm3YKkgz cgkSiFcmeRhIgfL7jiU9pHxuGKtPrWAlYMKgeZdJhi/w3MmoKIkY+2DIbRZCiw7H 5bvDfHRYxtIEtVWmJnF1HbzC4FMIvw2Q70MbjPLa6Yj3CXHh6LWdcYZRUVzMNJly 1ozF4aLffwqFk7KsAzY/bOOwB4yRRHY+kAsdrjSgwLQeLfGKysBCowvsIzkbtOqB rNJxPCRt2exQxhwMVA9R8zaQ0hyaN/hY3WOgm5cqayuQL9sy4OrdDY33ZyhhFZrU aHyb4bn1t0IsQbhM80Xh4MhX3RSGLUwer765a3NEvnsu58XcFtUM/8kT+TiicDc3 CrNZPmwt3e92LG0g6vc9mHUbuApEtj5e92WZsjy3KmMNELXtGq0Cx9rGlx5rorx5 q/WtINKM1Folchf7eoMiyAJsqP9BBNOp7vylar+7UVc13r2LCqnxtRXPN7BgAiqQ l7Ka9pPhhSLR3F1Wo4QG7keP0D6m+NHLIa2oO3erKC24Ky2DfqIva33dxJQL0mo8 GYrLVHCAtl1ibG59y1p0ywEK9KkdMOVTQ5rHmmbdgyxeo4/2auYoXYrLnPArrZap odAwsnVUeQG0cXAQF2m2ydbm0FJDFKb7bxKBnc4BbTaJp3g8sV37zYMbYtYo+shw vJZ1cD+TanbyezQnghESoMM4YuaKyVCUz6wsVTOSu0ZIWS6eux1fjuBzrEeC9WEg R3WnoVAnT007f9gnZh3eyY9ysmTtUnt6DqfCih5lWhW1WhX01gvFgSgDNz7+xpM6 1eF/YbfL9u64nfbYwITLBiF80FLhETtVoewRyCldiOrZvwG8bYdAoYAlUEz+lSu4 DfNmMzoPFBPOpx1zwpbbOKOY9U1MJMN3mOpPJ5C+bTL97Z31VzpUykWZKpdTOEMP Bd5qx4qlwmAqR/slS0DZLMyEL3jSwva8NXZUMQ== !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion

Extracted

Family

sodinokibi

Botnet

$2b$13$66xegcZsMxsBw2BDLmkQTu2oUSx.IYeFvQVIyRMfC99PEuhL1zjlC

Campaign

10

Attributes
  • net

    false

  • pid

    $2b$13$66xegcZsMxsBw2BDLmkQTu2oUSx.IYeFvQVIyRMfC99PEuhL1zjlC

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    Follow {EXT}-README.txt instructions

  • ransom_template

    === Welcome to DarkSide === [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://l55ysq5qjpin2vq23ul3gc3h62vp4wvenl7ov6fcn65vir7kc7gb5fyd.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    10

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c.exe
    "C:\Users\Admin\AppData\Local\Temp\457936c28938616495836c472b3389a0870574bee6a5dc026d5bd14979c6202c.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4648
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2116
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4648-132-0x0000000000A20000-0x0000000000A41000-memory.dmp

      Filesize

      132KB

    • memory/4648-133-0x0000000000A20000-0x0000000000A41000-memory.dmp

      Filesize

      132KB

    • memory/4648-134-0x0000000000A20000-0x0000000000A41000-memory.dmp

      Filesize

      132KB