Resubmissions

06-08-2023 21:23

230806-z8rpnacd47 10

06-08-2023 17:44

230806-wa5xvacf9s 10

Analysis

  • max time kernel
    131s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2023 17:44

General

  • Target

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe

  • Size

    164KB

  • MD5

    6b391f91c63765876e2571e87fe46575

  • SHA1

    d508632ca452af6325c06434b29883cfa55d7948

  • SHA256

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c

  • SHA512

    2e1c522393b137d7847c405cdaa735a4255fde534c8006460ef1a984eacc135fd8668fbd756d06b9011299911c2fd57c1a9112d01c046ebe8c98058b1abfae34

  • SSDEEP

    3072:pEa2d8CfSXceqmPDu7lvspW0kAo0BQhyI0hQMnnsJ:5CqlPDuBkJpoQQgdnns

Score
10/10

Malware Config

Extracted

Path

C:\Users\z3v8ehu8p-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension z3v8ehu8p. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A06978159654F0E9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A06978159654F0E9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: LkINV1puwV+WjHcfU6kcQPKklWzh29Vix3i01LJau3ejPio2HVw9C0z3gU+7F7Uy XvKIG1adNidJax6QWLqyNs0z9RbOqhqxvu/a1Fj12qemcWpQET5gQqnTlwFRRc0q avSdeGHZTOPyDstVldk/YmR8YUzkJ6ST5PsR2HMtotM+kesuWJSRzbFMTWEqBg26 vIa+GMMoKEb+OLhaWM5zwkowxjeROjDGpGiheIF7569hn7f9aClR0VAj9BLZr9+j 4tO7HWytDZ23OPFjgQpTS/AQjJhYwQqVFKEGGXY5KmjO1+3dsL4+aa3ZGvyaDLS/ g2KA2kmbkwOAKLmeuZMN7abOKkmXOR6apbpqve+0TWbC5rE9o1AIWsqMAacdAKY3 Sui4bxwBfDzYOYNfJa1vtl0xOTHaJUuoYUXk4HYWILggn5KwVQmhP8Kd0cq3Ithu UDCUR0Ed8cB2bNa8jr7NXeLcy7894AN2GfkjBe3HE9rUDew8fVlpRpal0TksttLr sYLBLA6dkfkxc4sB6VBLOWjO+AVb53HBKvZEa0I1ZhwWsUtK6pDuxcquW1hLiUjV 0RHDoKbkxIZ52Fsc0Tvf+f86YUUjnUjp1LvEZiN5+afooaYprW8To2Mc0B11z4D7 iOZSKntH2WkBaGlku5ld9RTSquUkLm8BRWySmQyLYDxNMgw+zaBAo0ngfW+SZ4iB uxU0GB+2Tjn5ef6A/Xd4Q6LOzBLU2Ma3veTLmmwJKf/6mWGNUZLOTAl607B2QEvw nE0rUbCAU5x0oZTxP8Zb7hHWQSnEaXbY6WemWXLquF69cLl7kQW0I5ddeSIEmCiN 1qtdYCq3LjW2ZEHVU7G+OOKh92h3Qbmt9uqLRjPIFsMWVE/S2hmO9dsgIcmr4ydf qTxrQDKek0LWSjbeyWGRbc+IYhgkc+5i3bCa9tLNGznzsCckSBTBqezu++HZ6lq1 qF/OOru80L0XS6TsrODofQVmee2LgQsAonOZuIXRg1BCla9E42u8Rei5OdBBTSUX MKGct1njF4oqCdt0cPbgrvNOQUY+FkrLYZczH82BJPvxCJpsYj8a49UBTlvz7p+d u8ul/l9++yOkCu+wlUz0IVWPMuXMa1gZVDp6HXm4KQ+e6o4ghFNIGsdQpvXEtWfG XoCTiuSeXZqIdrd7vrU18raVV2pUvozmX4Tgik5HvROVRgysBeW89GYcYFHnVsUU Se5R0gG8NI+PmiP8HAoErJSe Extension name: z3v8ehu8p ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A06978159654F0E9

http://decryptor.top/A06978159654F0E9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe
    "C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1636
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2988
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabBAAA.tmp

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\TarBCCF.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\z3v8ehu8p-readme.txt

      Filesize

      6KB

      MD5

      ec30d0b1fc1a3b0769973c809df7de0c

      SHA1

      00640d8b1592d0198a49911ad0c599abdd092f50

      SHA256

      f5c90aa7b86758081137af7e0bdfad2a0fc4efdc0fb1ee9aa05c6f6e019bbded

      SHA512

      b059a537d8ea8792f0e6efe3657765a9600bf58c31dc8001f6797eb00b86dec101d6ea76148b21da8d2cd7bdf1caecacd35b70d46b4e243d24ac41d14f907eb2

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      194KB

      MD5

      77cd7b0d8b7b92c2203b5ca97fa48a4e

      SHA1

      9edc2f132bd4ac670b6659a36674d47a435b4316

      SHA256

      36c11a25443998eb9989359ab1e8633d23f1cc08e30ae126b0444cc7ef2de34a

      SHA512

      8a727434316c0d1b7e88d3479f38336264129131df049bc6505dce0262c5a32613257af85942b294a39fb128c18f3cecf92037613b7aea0f515897a5e324ea77

    • memory/1636-61-0x0000000002AB0000-0x0000000002B30000-memory.dmp

      Filesize

      512KB

    • memory/1636-62-0x0000000002AB0000-0x0000000002B30000-memory.dmp

      Filesize

      512KB

    • memory/1636-64-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/1636-65-0x0000000002AB0000-0x0000000002B30000-memory.dmp

      Filesize

      512KB

    • memory/1636-66-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/1636-63-0x0000000002AB0000-0x0000000002B30000-memory.dmp

      Filesize

      512KB

    • memory/1636-58-0x000000001B350000-0x000000001B632000-memory.dmp

      Filesize

      2.9MB

    • memory/1636-60-0x000007FEF59D0000-0x000007FEF636D000-memory.dmp

      Filesize

      9.6MB

    • memory/1636-59-0x0000000001E60000-0x0000000001E68000-memory.dmp

      Filesize

      32KB