Resubmissions

10-04-2024 09:31

240410-lg5wbadg5y 10

12-09-2023 11:01

230912-m4spyabg7z 10

17-08-2023 01:52

230817-caqclseg52 10

Analysis

  • max time kernel
    122s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2023 01:52

General

  • Target

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe

  • Size

    160KB

  • MD5

    b572a0486274ee9c0ba816c1b91b87c7

  • SHA1

    43a904323a8583203b307c622c71c8ca706c2462

  • SHA256

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b

  • SHA512

    77d4ee400ded4b4be92da0170e7d2c197c312089429a1650e2843d0ceb15402d14f7e4fc3c2e84f20eeaa24995f0814c2106a37fc4cc32de7dbb4c15b6c5a171

  • SSDEEP

    3072:tp5SexkWi1Lbi4eTMlwDCnu/qjUt7ptQJS+s:HvGWwbnWJ/3tTQg

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\n5nd6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion n5nd6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A5042E5C5952DAA7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/A5042E5C5952DAA7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: SB6pqpH+noaWPHokMNF2OnueSzfELXXDy4Up7aEfsLw2GslMRmOnEP2shZwUMan+ qqZ505gQCAVfdfsxSTQitn4vKX9PdpVa6xxBGojnjbL5w+9xyOaDYLVG7qayPXTe F/h4Dxqwxg+CtrlbYMH+6JcmAXOAjBpG3XGi1h4nc4/BeKYsMSZDZs0offdVU+3R vNPdNcopmxnO85DcuU5JcyWRk9fk+p/kEG4jqLy5YE0N5iebdBeMJ2/YnbDOYvmW 54B1vB3Hu5KmkLVpBCCZ460LAlAhcqDxRgMSti1Ce4oubE6d1zgUgod7nZ2tT3/v 2NLdmtNtbzqt6Nid1JsYXQ57OB5RF01G3kfcGvAWZbiCnDxnOtv5DBc3N7GyUa+x nb6ijcM0WaIMl5PgyMMFDDduX/aFHTIH0VrexS3MdaguvwFHTEPRVLEy93ISZBQz gCvBoM2wUQ4UGcRvZ4/wqDaCvd5aP9AoWxMZZ5vMopsJsoNUMhK5LErCs2X+0bLv /PvNefGE4k7iZIB+dGAmLqrGB+SB8Y4KtCrioPcM77hNOwcwWH1sBrVZgCcWY6xZ dl6KN7DGlAYACePPNUzE/m/rJSPLG1SEw98ZPgWnB4BnCDlrDS/vMH8JbVnDjsew pAeuyr0b54889akv8j4Iz/sC6NJImOBpdzwxh7J74aA5R2RUx4YAeAr6keTAW6yr WJL+PybvYnHxGB5hAOrqsQDrAXzkmkEGWgI7LgC1vpIxWv7mKAro3gr9wrEFgwrA E2zkfnrWBGhK0TXXrFwk8jqU1Fc3TQ/wLdAFLbdevs0BxFEXCPz05Ir4r0Micjx1 0n9XLNTmeMsovL+4wJWXRrxIluMSDDVslF6eYFh5e9CGCWlGf+PPSJrR1JSMYJ+g r3L6pji30x3kiKA2OdVSfAOlV6WTKfSTIgXXPMcceA6NQmtNNknKvMyRCwKr2i/9 sy2VyfMraLwsror8RUS23pXn/fqOXJAwUh9OjzkpwtMt/gdsuPwS0R1PrxCkwDY6 oeyHNfI1F0RFXddnK1YzIUQ3XHOHJc6RTREb8xWhMshCIOHKjPEJVOoO4QuYXD6v 18UZ1Ze78eC+Ap2CSz3ET/NfqbS67pdGFdzkpmvV0TA6bXlnpQ7VMXr890d3IUyM m9I386IKM/mJnpkRvRETf3e198F04xbz64SnNCPdq8jRdC4rKqzMOW7unKcxcla4 mUZ2b69a Extension name: n5nd6 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A5042E5C5952DAA7

http://decryptor.top/A5042E5C5952DAA7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe
    "C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2864
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2720

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\n5nd6-readme.txt
    Filesize

    6KB

    MD5

    876e16acd37d556becb48a3e86ed744c

    SHA1

    df432c3f159bf97d43e44e7005ac0705c52c18d8

    SHA256

    e9d87d45c42637bb2266bb45ab599d3a7fe52a89551272823b9682b7488bcc74

    SHA512

    70128f54b3b1fc341255fd522983e1c9c43278ee73138d0c30f54a5a1a7db92ceeae28f7883ea9777f19a5baf890904b1b8d28d62ecbb60508211976e9d0913c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fffb4fb22b52abbadd4a4c5055d28446

    SHA1

    cfbbd697b41adb2dee9b0c1fdf2e37ace3224af5

    SHA256

    9e488a474d18e5f07a36480fd6c143749f7a7b7f04dc5971565c7a16166fe21e

    SHA512

    dcf63b2060da26eaa2fc0bba7819a48b1d6af8c434c08288446a00abb820d7d2ad6afc9ecb00230c63dbec7e52d1ecf52fbce1d853a78562370161671eff9d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    a639e39cc6d1332658d4c5fc2b29b935

    SHA1

    f9e8b6e9b6974babc83a14948914ba3fe4e3b7aa

    SHA256

    dba026403d72f36bf69bb3d96031e5d002d719a68aa34ce19f7ab040ed9a6ed1

    SHA512

    126377c8f6b7dcaede7bc16fdd8ecad220e70b3f2453b1675ba5c008e8d36e103fd3c5253f77c28fb0d3a43462e51fa11a81485bd04f001d61ec2927f4bd0413

  • C:\Users\Admin\AppData\Local\Temp\Tar5BBC.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27