Resubmissions

06-08-2023 21:23

230806-z8rpnacd47 10

06-08-2023 17:44

230806-wa5xvacf9s 10

Analysis

  • max time kernel
    138s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2023 21:23

General

  • Target

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe

  • Size

    164KB

  • MD5

    6b391f91c63765876e2571e87fe46575

  • SHA1

    d508632ca452af6325c06434b29883cfa55d7948

  • SHA256

    d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c

  • SHA512

    2e1c522393b137d7847c405cdaa735a4255fde534c8006460ef1a984eacc135fd8668fbd756d06b9011299911c2fd57c1a9112d01c046ebe8c98058b1abfae34

  • SSDEEP

    3072:pEa2d8CfSXceqmPDu7lvspW0kAo0BQhyI0hQMnnsJ:5CqlPDuBkJpoQQgdnns

Score
10/10

Malware Config

Extracted

Path

C:\Users\z935364-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension z935364. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8E01FCBDFB269F17 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/8E01FCBDFB269F17 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: VPg4aYXMEsun4TUJVDCjA2HS9Rm/cMGNkXt+JD2bkfx6mi4TDKjARxRq4QCJtxbM vrm1rrBpXtRwgU439A/2tB0rwhzG7EyMI4MN3cs/DT3qqDpQ9xN+rpkcS96xMy5k S2fXuZ1ZN1lZNmLsk4MqXYrHNnntRfRC52RpakBikaFsP8+RMKTj98NQbV9Jg/xk p/scaef1G/Ic50t3/uIpT3HbjUYtS2jOlVCZA0P7MQaaI61nXME9t1oDyM8zLqHO 4bQxzOvfeqDrGtlzOWrx14JibqMVB+07+AGIUANzwjNQ4pkQSWlzsA1N3yQ/d1rM ehx1MNxuhiqrGrV5U0KvrbAQugyOBLoSFHn18ej1kJEZESG16YSqJi1Snc3AlHq4 4FBS1yawIrcDFNlq8396OAgTAUHDc7lVIEg+GrdZGA6RdW9EdyVaW9hnzaO2wq8y YKC5eZ9UvzlsqOKCVFWwYoE2QtBkbp2unJUKvxaOlZNO0kfJsC9O2bk/6yvzlLKe 0DT/w5IVESkn2MtZMpikHK4iXq8+3iSKp8JF+ZZx82zOXcvFbEukDPqTxd8GFyJw Z2U4HxIS9143m9uYVSyiSqY+VBsIW6yCdxhpmI2MJ+Skdw/eWvKl5OVUBCUUixOX Jttmhf6+SVP1FK3X32x3xtjiyVIj96/GEmfGlpJ3lisSJttBziOUoGVlKuNOtse2 J7CgKKcPQxdwBL4Hnv2W44VIy4/ZMDooo9xsCG+AvkP3MAL1N6gtTT5g9LPXWwxP hi0pqnywCMhPhhh6hHugat2sZSl2L149/MVkEV6nVyAI1VB2FBS1hGxicrKaVcXI 4XVEKdA8n/hbf90D/lY+aEaanriSkl1Fg8ZNPuAEyNNCuGDRiWyZL3XRCxPz9CfA pYnYTAih7wNtoOodLQvuh8XDUoDXSWG69U6KYkZDBTIotKiMTGZJfIv5YdFzz1db 05vvRmimNwm2bfw6eaWOIl+PsyQ7tM8I7bT5dq26JpRn4UDkVNPK2FfzBrw5fc8k 2xiPp06AiHl11rvXLbAM5v5nzBvLPCCrmlxFZYorFD9u42PiNShTIRPNAhSqi8E2 DychC8T0dF61pH3i4GZdHoIAgcVHb58F378CHedpMn6z60lRSjlysLdVVTWOk4xy rJP5gXUmrQNkpezhs1uO+LRebQzARWnVeX8ZmGv3RSpEkNCERkZiyOc3pfn9OMCS lFNyXg/v4BsIn8qHo6E= Extension name: z935364 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8E01FCBDFB269F17

http://decryptor.top/8E01FCBDFB269F17

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 42 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2572
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
    • C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe
      "C:\Users\Admin\AppData\Local\Temp\d09338f3248b7c43b4c58274d453732fca910a0cee2ca50a2b72fe0364fb615c.exe"
      1⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2624
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2920
    • C:\Windows\System32\xpsrchvw.exe
      "C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\StopMeasure.easmx"
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2676
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\Desktop\TraceExpand.cmd" "
      1⤵
        PID:1592
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2000

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Cab3BAB.tmp
        Filesize

        62KB

        MD5

        3ac860860707baaf32469fa7cc7c0192

        SHA1

        c33c2acdaba0e6fa41fd2f00f186804722477639

        SHA256

        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

        SHA512

        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

      • C:\Users\Admin\AppData\Local\Temp\Tar40FB.tmp
        Filesize

        164KB

        MD5

        4ff65ad929cd9a367680e0e5b1c08166

        SHA1

        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

        SHA256

        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

        SHA512

        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

      • C:\Users\z935364-readme.txt
        Filesize

        6KB

        MD5

        5f25b9b7001e09518af9860a1d7dbbb5

        SHA1

        47f786c687f9804acd6577a96e435006446f2945

        SHA256

        f2cf8e51b4e8890177d317453d964867b13329e80ffe63494ff129012af0b283

        SHA512

        2b4ecae25ae1d4c230c626a3c281ca21ab33b7dac6a949dc9ebeb2534bbceae21fffad5860c1ca0d998cc6b50b2d262fa99d796abf7c44d172a2ebd112120e20

      • C:\Windows\System32\catroot2\dberr.txt
        Filesize

        194KB

        MD5

        e8ccda88bae6d643cb677b9eab01e0e9

        SHA1

        c892cfc4f1cf34554eeece3d94022659a1dd9732

        SHA256

        3cb7d1d3e98668afb8f3fce2e454142dd7be8126ae35dc07d18cd9e43044a0e7

        SHA512

        f96c1268f6464b89f30a0d12239a74526c7746b99cebeefb1fe5123c521924392f342f7c08f9d61ced26258c4083f97a15b67a2004d8073f81c09bbd71b914c2

      • memory/2000-673-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-671-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-678-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-677-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-676-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-675-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-674-0x00000000003A0000-0x00000000003A1000-memory.dmp
        Filesize

        4KB

      • memory/2000-672-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2000-670-0x0000000140000000-0x00000001405E8000-memory.dmp
        Filesize

        5.9MB

      • memory/2176-67-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmp
        Filesize

        9.6MB

      • memory/2176-63-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmp
        Filesize

        9.6MB

      • memory/2176-62-0x0000000002A00000-0x0000000002A80000-memory.dmp
        Filesize

        512KB

      • memory/2176-61-0x0000000002A00000-0x0000000002A80000-memory.dmp
        Filesize

        512KB

      • memory/2176-60-0x0000000002A00000-0x0000000002A80000-memory.dmp
        Filesize

        512KB

      • memory/2176-64-0x0000000002A00000-0x0000000002A80000-memory.dmp
        Filesize

        512KB

      • memory/2176-66-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmp
        Filesize

        9.6MB

      • memory/2176-59-0x000007FEF5E20000-0x000007FEF67BD000-memory.dmp
        Filesize

        9.6MB

      • memory/2176-57-0x000000001B1F0000-0x000000001B4D2000-memory.dmp
        Filesize

        2.9MB

      • memory/2176-58-0x00000000022E0000-0x00000000022E8000-memory.dmp
        Filesize

        32KB

      • memory/2676-65-0x0000000002E40000-0x0000000002E41000-memory.dmp
        Filesize

        4KB