Resubmissions

06-08-2023 21:23

230806-z8rpnacd47 10

06-08-2023 17:44

230806-wa5xvacf9s 10

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2023 17:44

General

  • Target

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe

  • Size

    164KB

  • MD5

    6b391f91c63765876e2571e87fe46575

  • SHA1

    d508632ca452af6325c06434b29883cfa55d7948

  • SHA256

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c

  • SHA512

    2e1c522393b137d7847c405cdaa735a4255fde534c8006460ef1a984eacc135fd8668fbd756d06b9011299911c2fd57c1a9112d01c046ebe8c98058b1abfae34

  • SSDEEP

    3072:pEa2d8CfSXceqmPDu7lvspW0kAo0BQhyI0hQMnnsJ:5CqlPDuBkJpoQQgdnns

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\v3spnb24f-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension v3spnb24f. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A77093FC9CB5ED99 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A77093FC9CB5ED99 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Wig8KymjjTYCrs25Pg9xosEhciOFHUxsImi7vIOHa+ijuoeNgZaKlh6G5TbuijJX IHir4Bi/L09GZJZEutI4ooTQDFVGJCPUtqB+hsi1YAy0Jk4mdrOXR62yEkEDmWgX WiGzVFPN6bVWXjYHUBhRFKOCSEUnFYMrazrmL0NAEtjvjQZ+U0StDSXSTG9U97aB z513kt00Kg4nkykV3/Th08L6PHFNLniJVKH63aEy9sF4Kfwi7PiLgHmMs20Hy2HB LTDTX4OKC+Mq/9ky4Nwv3UT1gy08yiitT0+zqgYPrMd9dpEHp3umI3U8dHwgLU1v mzie9U2r7b5KSqrB56zC0iac2zFx09t4XFhN84WEychDJ2IZnlIw96AETQh+7KCE V7rlYuhKQdvIfUhhzjjBPilpLTLYsIfL2A6BEQlVdhvc5EYxyQ37Mr4PqvAu/Zy4 zuNUCHKngYwKGs81AcNik+Jn7vLPmv4Fhftq/bcn5pZrMQBV43n/ovyEz1GESlRJ eU84zyIcU3yzgki2YOLzTQAYUJYmH1WOSy59J310xM2WrfwBKWONw3cXHF3hFL4i C4RPQwj9CC2OdWxJLlHUSy9nF6yMXR5htMVb5QMGMJ9HRWzHeMDlNhwPAF54F8vd YZlqpyZKR2zeAZAC/NveJ2tMKpbb3g8aF+SFnxJZg934FlLiBlPiOyL0N/53swKI +X8vwg8GpXI1/cPpDMdDzKb42F0BAXu0wLcaV2CwX3QDGS6qE3hVJO34IImEgTWp kiXpo5dyTJZFPnwbMUxw14zWVH28JgIf1CVdyPf9C4cdWLMGbspgr5nnruHjqCQE EIs3qJhQK72pr462VCdO+rsyyPKczJl9Id7V1FW+IpZTxiYGIQgE1NSHtHL9BvLF 1Kacr6EpiECCZ85J77Cq/wOii/3Fv7WEYl5u516PGkkDHrGlCBLavwAodtZL9UPQ FTeE5cUYy55OMTUFNHIF7mUvxOVQ1CIZeQnnMoh6PPcAtDZ2WhWLahIngvGh47b9 7HNDFiL+acyn8zu+o7UisV5yPvuiO0xUIYwXwKkjZgTuVmYI16S6MxBTyIN8RAqt nHOCS7H03vbVegqNgeZmUoxIBPxWaai5pHUw70P9HXd2lJgPuzbHsensjRg2vsxF NYwWWB0eh1JmvMiiyl/hAE2IgFw5LIIiv0m71hsiKoVOjWRkK1FpN9iirtZ4rHIs MrYOLOuZhI4hsFs4Z3n7YlhlmUWj+mU8 Extension name: v3spnb24f ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A77093FC9CB5ED99

http://decryptor.top/A77093FC9CB5ED99

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe
    "C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3244
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3264
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\v3spnb24f-readme.txt
      Filesize

      6KB

      MD5

      3a68660ba882b6bd59b31d4cd98cefe9

      SHA1

      a3824041c321d67e6b367711313fe0f5d850bd01

      SHA256

      2d6bd96a70f988e92c1d2cf262d53037781bd797c11967874e1baaf91e681ed5

      SHA512

      47da0f10e8f2db92145c96e40f803999059d1d13cd57cadaf23f98712c6ba47e3680c9a83e2177020e2f7f82906aa89abf03f29a4d27a8467942922dd77efb3d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cyeb2uhx.1h0.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/3244-138-0x00000245DD2A0000-0x00000245DD2C2000-memory.dmp
      Filesize

      136KB

    • memory/3244-143-0x00007FFD57860000-0x00007FFD58321000-memory.dmp
      Filesize

      10.8MB

    • memory/3244-144-0x00000245DD360000-0x00000245DD370000-memory.dmp
      Filesize

      64KB

    • memory/3244-145-0x00000245DD360000-0x00000245DD370000-memory.dmp
      Filesize

      64KB

    • memory/3244-146-0x00000245DD360000-0x00000245DD370000-memory.dmp
      Filesize

      64KB

    • memory/3244-149-0x00007FFD57860000-0x00007FFD58321000-memory.dmp
      Filesize

      10.8MB