Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2023 20:45

General

  • Target

    NA_NA_38bb6d3370e91dexeexe_JC.exe

  • Size

    122KB

  • MD5

    38bb6d3370e91deee960c8aeb6b0a50e

  • SHA1

    ba9e23c4f6e7435e90e92ffef836386053c04ca3

  • SHA256

    8ece3ce00a84b7365b96487f215cbbea379a8df57ed7c23a2add8758858fba6e

  • SHA512

    532b5f6d68b2526250d1c307cf265b84985ce4c4bc4b00a3c6c05edb051bcc6fa06b64c987de1279746a2c5d91c951aa6c4820546cf2985a1e6d608c0a011b22

  • SSDEEP

    1536:hxOUyl20w8bVZQ40iMSO1fY+iUyQs2r8t5p1ySotICS4A6UdSJOfTo4QVvA3T2+g:hMhQNDEtb3AirfTz0vAVR/6

Malware Config

Extracted

Path

C:\Users\54mvm1-readme.txt

Ransom Note
---=== Welcome. Again. ===--- We strongly encourage You to pay your attention to this message and read it to the end. All Your files are encrypted, and currently unavailable, now all files on your system has extension 54mvm1 Before that, all of your most important personal and business files were backed up to our secure offline storage. We took them for temporary storage - but we don't need your files and we are not personally interested in your business. Our encryption algorithm is the most technically difficult and max resistant to burglary. Only OUR specialists can decrypted your files without loss(!) Any attempts to decrypt files on your own lead to damage them beyond repair(!) Best way to you will be consent to negotiations and mutual agreement between us. To connect us you need to download TOR browser and follow the link to begin negotiations.(You can find full instructions below.) We are waiting You and ready to listen all your offers and discuss them. If You will ignore this letter - we will have to sell closed auction all yours private files, photoes, business correspondence, documents and business files + with our analysis of your work activity (weakness of your business, financial violations and the opportunity to profit from this information). It will offset our financial losses. Or we'll just put all your files in the public domain, where everyone can download and use them as they wish. * For TOR Browser http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/ We are known as "Sodinokibi (REvil) Ransomware". For example, this article: https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread You have a guarantee that your files will be returned 100 %. And remember, this is only business, nothing personal.. We have a concept of business honor, and we can promise something if we come to a mutual agreement: 1. We guarantee to decrypt all your files in the shortest possible time 2. We will delete all your files and forget about your company. 3. We will show your weaknesses in your networks. .-= INSTRUCTIONS TO CONNECT =-. How to get access on website? You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EFB63750FC8B4188 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/EFB63750FC8B4188 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: phVm0knx4Hv6a6vrfY2vFasov3rubSAuv/Cr8SKf0Swb89JYskV3ZKkP+HoHJvze BTAckX4epikGU7qivv5qHdTSNhw19BfwTqr4wLTdhPLTCt1BcX03CE+LR00WXF9D cRMrUJ1A/7Hzut6VYINaSkvFAf8jIwzzuA/17ojGYMWam/KmOY9cCm1EHH2ht4B3 gUDnFjjypsCdyhAAu3WSWvRev+0rVU87jLN75+rK9Bqw6WlZ4ndprvGExHG5IcC/ qGozVIeeqec3AE5/pBK9yqdIfD5+HkpPQX4L8BVoofvSXjb98YwD4JglAO0ZXKeR dSgEHo360q+TdNggI3LCDoLnA0A2ElWhSH1Ldr1sTjNegGQfkgsAjmjfobba2BfW ZEH65+EJghdlQLmVLGUzacn/5WsdVoAah8lX8vndpOaUayCiPIGYXpY9L9foTvuZ utmuBFVFHjPjWRqzfdpwM7fQLcc6kEhGec5bx8LwN1EycKsj7plH3g0dSrERShY8 HLGLZqOSuOScMik6d5Kvc98QVizbS2DNqaYMaWSvyyzxVD5By3e/9oMeS+Yxnvz9 Uejqboaf89up75CLt1lc7xr7JOc70zd791yh7eaDJMwS+EvGBVvHSbpqXzN+PIxx 50N6Qd5N8FhY4yrSKJVsBeVP4hLZgg50jYqj+ExfWE87IGGTLEzT85v1rhldU5U0 Z1opZCjnL+iFSjx+r3JC59uNEHy21Rq368JCaIqaN68hW+eOjkSu36AfAAhKf2oF k+2YCwkhUAZEv627LXiPlIvYG7b4uKAeQhD0DQtxMFp5NoGuVatEjUOx4GI0DkbX wp8DI3vzFxdzaEDfGm8D9Rh0iwAbm00EBoyk/5Fy08SfbUFoJ1PM/pgvO8MGmAmr qjSeYgvHYry/WbWtV9GoLWqB0uwwvlxuetu1TlVE5ayHTV8GWQD4bvseRqmsNXbM nZ2jhJalt8hjr39q5v8FwVjf2OhkFf5V/x/ikW+YdCLmEC9kotDdZ33m8NsrwONE AMeHeYhmrZMTAJT4O7YwytscEbuUzw2/nO6wIH0CGZcegp0eGsu9R4hU5nCoFXYL pYyCPW6lG4pv5JvUwer4nTUr40UG8bMEyk/PoW7y1l34BNALP3z7vCOjTPYFfZpr 6lZMa9ewCwegESIuUKnWLnDavJQG2NvCWsYiEY9XSO//rEDqv0JqdNEhy0K/F8Pf pEYI2MEyHBd10MUTr4fzZ46K0a1LIpJDQ7K4VrjXSieyjSuOO2I2zINFiOQl8Jtd GOuGxnUosClY2eNZT1YJ/tbbuaumenVndUQA3tyYIYgfB9yfgJ78Y4o2dwbvB4Ol oAGzHO1d/iNcaJ8+nu7Mx6v3wDSSMw== ---------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all your data!
URLs

http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/

https://www.coveware.com/blog/2019/7/15/ransomware-amounts-rise-3x-in-q2-as-ryuk-amp-sodinokibi-spread

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EFB63750FC8B4188

http://decoder.re/EFB63750FC8B4188

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NA_NA_38bb6d3370e91dexeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NA_NA_38bb6d3370e91dexeexe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
      • Modifies Windows Firewall
      PID:2632
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2184
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:512
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3016
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2336

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\54mvm1-readme.txt
      Filesize

      9KB

      MD5

      41916c891ae0bf515bc334c582494d97

      SHA1

      88be8a09d32823c99e4f79f3a0fb21f03fc7f6d2

      SHA256

      517ad23528f39854fd082fbea8a898caab5f3c8af4b20cb5da8d359081319793

      SHA512

      29a7783151957e1f9521a1f93fc120e23e7282f89903b193882040e447be990a1536098bd3b2c35e6d3fbc997d525d5db1066c8fa6adacf633c591d943cc9874

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      e4667641dc8c6039a3c1a22751bf37af

      SHA1

      34caa79a9f74565402934cb67251cb8b26914a70

      SHA256

      53c1314230be63ce5ab6cbbb4de6ddebcba6ebb3129c644cd5925566315d9b9f

      SHA512

      8327f4b6cbcfbfa43940fbdbfa0bc37728616d99029e5b4c08c491c1f45467c3b7e63e5ee4569339bedac0f20fefb6cfc4fb84a1e40e32aa696ecdb5310244f9

    • C:\Users\Admin\AppData\Local\Temp\Cab4B4.tmp
      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Tar4E6.tmp
      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • \??\PIPE\samr
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e