Analysis

  • max time kernel
    137s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2023 09:11

General

  • Target

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07bexeexe_JC.exe

  • Size

    160KB

  • MD5

    b572a0486274ee9c0ba816c1b91b87c7

  • SHA1

    43a904323a8583203b307c622c71c8ca706c2462

  • SHA256

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b

  • SHA512

    77d4ee400ded4b4be92da0170e7d2c197c312089429a1650e2843d0ceb15402d14f7e4fc3c2e84f20eeaa24995f0814c2106a37fc4cc32de7dbb4c15b6c5a171

  • SSDEEP

    3072:tp5SexkWi1Lbi4eTMlwDCnu/qjUt7ptQJS+s:HvGWwbnWJ/3tTQg

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\93menjskj8-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 93menjskj8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/DE5898E3DF8D088C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/DE5898E3DF8D088C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: x2A01CzCTvygb/wjPC1ISyNZJuwkmKJlgqtoyaeIcK37uA0tZarju0uvUccAWo7g krXQe2/EOpZWSze8vnxzfFzTZJc+aevgDbTieYAMfse8YLJRVezuOBn1sTKBE0BR WHbD1dj9T/k9Q1JMun8NOxBsuFqKezbFAup/DkLI8MDk5duj2ortghRf1O5H6nN3 o0x7A8EZsmaf7qUpWPJyrttgvcVFqlCUMo9Fd/S59MrtIT4kl1GcVSH9wYGctPZQ ThNrMFL28fe0aZu2lnkwTzgoDqvX6D6hzIWpJ9t1DXEJFBlHMxxCmLtRM0Pe5OcB 4PrjgwjdytfI6+1+lSCWru/xc39UJ/OuML2th88EPzV2YDVj+5VjoXFOOQIW2Pmh df/jfuFksb2t77/EJtgDDSH/xr8UlqdlpFLr34VLJTeuS5Kre7HMw6JyP1KUZcrm lULgTqJv2NPtJ2EKtKUrIernCF87mp5L57dTfsZxhd7vzpDIT3/WgcvU9o61129h K0aA3EemITP/Lfl1jqqynm5ihWR8vb45zNQ3uUB8Lju30wvScjZsFezzfzXuTnif h0y3tzZNWwvEdmPXDY5RBjp8sCCxzu+qFgPtX2qaNiikqyo3ROlkEtXsXO9nlYus uumLQkjpPDwvpdEnRYr7JsBYEKGRxbHRR2PoVVhQoeJi0AvBNHZexWJjLKTLjcLx w0GP7n8dafsJrEJSXvg4leZGb+19pLU2+T1ezmrKArG3lgq1cS6ZIsKxwCxFwu4I He8fenUXwDKSiR50Xs7ZRYX6wtwp3XBx/LA4m8GDUjXV1I3j627DyA4i6W+01IoY +5PqKCC4WIrf4EHSbzL8zIP2GVGgwK3/vMRoxTOCsV/zGJUs24ZWrO+WtkyP2/6B joLaHRUm5CKX1D3GZ8K+tXRM0Hb3quZrVMhYw8VvTg9F0aTR3crmPsdOKKJakLbg o1fe7MJujEanF51UAMpWbt5cn88Grs4xmjoBKY4/r6FGGJ5Mhq5Z4h6U9Nxq0G8U DER54XfUvn4k2jZ0m2P6ENNXCRSs/oH2YcxLVTeOYLzF+6ocD1wVYnm5h0rJPp6N TXw8c4PTEzhoikqS5afd4dwU/LIKAugPMkJs+JH7VcVoxp/2kYX3H6pWRAc01WJ7 9vskJddRQJ2zD5y9hFiIkPYVVAc4+ePqvgdZFMd6ce6lMm8rbPXu6RlkNyyihSaa lU7xPGP7wOcdYJVEOLuoLQ== Extension name: 93menjskj8 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/DE5898E3DF8D088C

http://decryptor.top/DE5898E3DF8D088C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07bexeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07bexeexe_JC.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2756
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\93menjskj8-readme.txt
    Filesize

    6KB

    MD5

    01af861e151d6a4ef07b815c5649f077

    SHA1

    4ed2d1d4c9dd0f9c010b469e749cbfe67616f75e

    SHA256

    6cfaea9cf4efdcd1ebf23f0f484444971bd52ea037bc54c24a1875f6f186ddbc

    SHA512

    9b1f0aa17716258ec418cbaac1cf487bd60dd61091a657a3538229d001038a4a81a8a850ee768661977c913f38b860f1f00d4fd79aa131d889d4763acc29afaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a48d803d363e4a03364a348cf34552b3

    SHA1

    06fc3a750ecd7f1af5ce1bf33cd743301b4d3c8f

    SHA256

    77f9dd4d5136d583a31c131db05bb5c663cf21956e1b46cfd57a0e40b1657563

    SHA512

    a1709c29396084dbc294482894ba0ebe7191747b855d73746b15844768cc7e5427a87c52633626c27583d94ed78c2809dd415459b5453486c3c2c5eb441e2ce6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    4468b30224e4de11ba0e99691ea0f933

    SHA1

    67fb603bdb859625cf4cf784b8974d5014f787e9

    SHA256

    ab5976a5499d5f8af90409ac912322ac40e6ea48cbe150f56285bad08bbb6747

    SHA512

    c3b08c384db2d68f98b5cc7ad1835734d22051db69052f2694ae709be2c407532f1399c22dbc80b7d29530ae79364f680b485e4385e5cdde2df4d8739bc975b4

  • C:\Users\Admin\AppData\Local\Temp\Tar591.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27