Resubmissions

14-02-2023 04:33

230214-e6z8ssab4w 10

10-02-2023 07:04

230210-hv9vmsgg96 10

10-02-2023 06:59

230210-hsg2vage79 10

10-02-2023 06:49

230210-hlmzhsfe71 10

10-02-2023 06:42

230210-hgvtkaff86 10

09-02-2023 14:35

230209-rx1jesfg53 10

Analysis

  • max time kernel
    114s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    10-02-2023 06:42

General

  • Target

    2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe

  • Size

    219KB

  • MD5

    69d6f75b8cfd52216a6ff4b0861655ef

  • SHA1

    2c644dac27af557bc1a8329baf943e8b81170b2e

  • SHA256

    349bdb12a75fbfc2803f988862764ba6058b371728930f8dcb248f105ce607f7

  • SHA512

    48ab4714e8ee1a0f7327160ebeacae22a31efc24fd89822521d5fff0c44fbb814646457cb8eda9429316102982f13bdd0f29f4189902e7a3e7ecfd3c055035fa

  • SSDEEP

    3072:ur85Ce8F63VETed7/kBazzFbULpC15RM4ENKQ4JTBg0D:u9eS63VE6F/M4qE15NENn4FD

Malware Config

Extracted

Family

sodinokibi

Botnet

19

Campaign

96

Decoy

speiserei-hannover.de

delegationhub.com

subyard.com

martha-frets-ceramics.nl

hostastay.com

luvbec.com

dayenne-styling.nl

111firstdelray.com

lidkopingsnytt.nu

fbmagazine.ru

peppergreenfarmcatering.com.au

ya-elka.ru

mundo-pieces-auto.fr

mediabolmong.com

yuanshenghotel.com

fidelitytitleoregon.com

penumbuhrambutkeiskei.com

2020hindsight.info

aslog.fr

teethinadaydentalimplants.com

Attributes
  • net

    true

  • pid

    19

  • prc

    tbirdconfig

    onenote

    sqlbrowser

    firefoxconfig

    ocautoupds

    ocssd

    thebat

    winword

    mspub

    dbeng50

    steam

    sqlwriter

    sqlservr

    msftesql

    encsvc

    infopath

    mysqld_nt

    sqlagent

    mydesktopqos

    synctime

    wordpad

    powerpnt

    outlook

    dbsnmp

    isqlplussvc

    ocomm

    sqbcoreservice

    oracle

    thunderbird

    xfssvccon

    excel

    mydesktopservice

    msaccess

    mysqld_opt

    mysqld

    agntsvc

    thebat64

    visio

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    96

  • svc

    veeam

    backup

    sql

    mepocs

    sophos

    svc$

    vss

    memtas

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi/Revil sample 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe"
      2⤵
      • Executes dropped EXE
      PID:1612

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe
    Filesize

    179KB

    MD5

    d0190f94e6d05104977c53b55dbc2911

    SHA1

    c0ff002b0e26b180a741c3cefff15190df7746cc

    SHA256

    f4e5d7a95681d920dda75fe5dd89be249905e2a7712f9b3b39e19351f5ef5e69

    SHA512

    d4b1cc032f9d8254ac6035c27948147d8c4c5f60be51e632ba26c6e34ada87515b3113b4bd1cec3cedfa1a73c465a1267681ca05356d8f2f08d81c4fef04d868

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe
    Filesize

    179KB

    MD5

    d0190f94e6d05104977c53b55dbc2911

    SHA1

    c0ff002b0e26b180a741c3cefff15190df7746cc

    SHA256

    f4e5d7a95681d920dda75fe5dd89be249905e2a7712f9b3b39e19351f5ef5e69

    SHA512

    d4b1cc032f9d8254ac6035c27948147d8c4c5f60be51e632ba26c6e34ada87515b3113b4bd1cec3cedfa1a73c465a1267681ca05356d8f2f08d81c4fef04d868

  • \Users\Admin\AppData\Local\Temp\3582-490\2023-02-08_69d6f75b8cfd52216a6ff4b0861655ef_neshta_revil_sodinokibi.exe
    Filesize

    179KB

    MD5

    d0190f94e6d05104977c53b55dbc2911

    SHA1

    c0ff002b0e26b180a741c3cefff15190df7746cc

    SHA256

    f4e5d7a95681d920dda75fe5dd89be249905e2a7712f9b3b39e19351f5ef5e69

    SHA512

    d4b1cc032f9d8254ac6035c27948147d8c4c5f60be51e632ba26c6e34ada87515b3113b4bd1cec3cedfa1a73c465a1267681ca05356d8f2f08d81c4fef04d868

  • memory/936-54-0x0000000075A81000-0x0000000075A83000-memory.dmp
    Filesize

    8KB

  • memory/1612-57-0x0000000000000000-mapping.dmp