Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2023 15:35

General

  • Target

    123.exe

  • Size

    218KB

  • MD5

    06122ab780f95516e52eeadcc5384f64

  • SHA1

    c54c8d31b77deefb6a4e03ecec613b75f75c20ab

  • SHA256

    337900815fcd44fdafedea82ebebec9454e3eb789d63072add59f812a5983604

  • SHA512

    ba9b24857875c751ba05a1139b689ab294ab4f41d03ca871be5648d03da577170be22e6383c42662da4ded515c063418ed82aa955b0c20cba257639143b70dc6

  • SSDEEP

    3072:gUwEMgkp2ikbL7fUhRiq9GrhvQWZoa+XGOT4w8Y08i3a5kbKS3CmJo:gUnMgVbs25rVwDAaibKqCe

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$12$ZRbGt.TkbFIxsHETy/DgxeuGjWaLzaHrccVKRVs0/EwpW1qFY0WHi

Campaign

8249

Decoy

izzi360.com

devstyle.org

ziegler-praezisionsteile.de

rumahminangberdaya.com

justinvieira.com

edv-live.de

smithmediastrategies.com

innote.fi

waynela.com

precisionbevel.com

sanyue119.com

hexcreatives.co

xltyu.com

slimidealherbal.com

naturalrapids.com

edelman.jp

bildungsunderlebnis.haus

verbisonline.com

asteriag.com

2ekeus.nl

Attributes
  • net

    true

  • pid

    $2a$12$ZRbGt.TkbFIxsHETy/DgxeuGjWaLzaHrccVKRVs0/EwpW1qFY0WHi

  • prc

    dbsnmp

    mydesktopservice

    thunderbird

    ocautoupds

    excel

    encsvc

    ocssd

    steam

    winword

    sql

    visio

    outlook

    agntsvc

    oracle

    ocomm

    msaccess

    onenote

    wordpad

    powerpnt

    tbirdconfig

    infopath

    dbeng50

    thebat

    sqbcoreservice

    firefox

    xfssvccon

    isqlplussvc

    mspub

    mydesktopqos

    synctime

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also we downloaded whole file server and make Sage backup, that means leak includes: -Detailed engineering diagrams; -Finance reports (Payrolls, incomes, budget and so on); -NDA with customers and subcontractors; -Employee information; -Other things; In case of your silence we will publish it in our "Happy blog" [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    8249

  • svc

    sql

    memtas

    backup

    svc$

    veeam

    sophos

    vss

    mepocs

Extracted

Path

C:\Recovery\939p4pjc-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 939p4pjc. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also we downloaded whole file server and make Sage backup, that means leak includes: -Detailed engineering diagrams; -Finance reports (Payrolls, incomes, budget and so on); -NDA with customers and subcontractors; -Employee information; -Other things; In case of your silence we will publish it in our "Happy blog" [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/41205AACA49B26FF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/41205AACA49B26FF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: O02CegGAbdOsK8NthHwzSTQN+yh56dn1E0FmFJc9m3TiWyyUb3G+OAM0vGN332R/ pdF/hkQG6ClYC7iVKb4lBhcBGV7B7zSzShh7Xb6L8G+5p4Mrsl1cXgOwr0dri41t q45afFEJtfuLw0fKTe4etS20UJBX7ZhDOLEddpwN+O3yOiQoM7Qd0WFCrAFQLccR tcVCdtV4gmNaBFm6hv6UQV3WPkp47CSb+MdPc565SOGROAwxIEnytWO6kHGPhccw oLYvhxR40DbzMHOHDfYJHj+WxEC9rV20j9TKBmHDwYQypxKa8AFX1Sj2TPQi/3xr z1BGoETMUgLqL6Kwjc/XEmxodJ16D5+u0dJG2ZRIuP9ShNyB1cawNP/q4ls8omF/ JzDUpPurdi51wtn+p/Wgn5VS4GT8znRzFnet/4fI5Orc8TDXipHvZYibqlNrYWl4 +uySdYy0349M0d+dHKHJgY7v8XRuPfAPMMUtfSbM9ZukLtRHD9wnxbSpha0floNh auTFsyOTsawMgaFXgZK8TzXyCrijB8BCnSVwlAvLO/m3hNmG4EftE92LU7ZnBjiA zRZTLjm7dCrpE1lDdPCTFSNpaTy7dlZIowupSDGAhQF7udtpNLY5KYTzEvy4B0WT Td5zwSNzfPCfFPNSvJxxou4B+NOoe1wMpvTnZwOWXougFpKDvH9T1mT9xYJCxjLo pyaJPoBrQCpcQ9Ttt54W61rUcwKxJA6Vcwqqt7iv3aaMNQM3AnS6HP8eFJ3CbPUD D3aJT+LrX20RrY3KfMdxarTXt66o0503lcqv0lxL592y/bJbXPYWqyHaAiPTss4l KXAWEOmH0dqBZ3bqNSLH9Ky37oakMq3taTCjMQ2gPZzDub2SQbXq1B/RmvFUVWNI LYS33zpgdX5aY2kM/hMCCxCD4OCsHksUkLC3gpM/NlrecMobFT/+T9bRrHG1JZdM UX267hOgqmm5HXuL8XpNoNMGTVoWcq1L/UpdNxBuL8hQbGjaDYRrVZkzWbrumZeq 9Hook72s8hTy3CHCu1zuPHUI2IeYk87TmwYNZNqIvNSUpcUqr9/2QF612fzmkv2E BEMmiHgKHOnCx8pz2gEGdxa+X2aJwjVJss8YLBZYJ5jvdcLuMX5z7DBMcYIhHREy 7I80mtVVPiNWsM2cpUTo5ZVc0vAABeeKd0StEjaJDRn1QW8oRvLXmLz2YoUfFTeD MwF8b7nKPQcuS2iqXzPMJNBqUCnBo5KUzmlanbiB/g5L/R5fsmb8KWT5ftAojpPH BWo6vYqNXokMH+hLpj0p6o5WIV0QuiwlQiQXy/g+n6q4CP9CT2h4sFAxEHI9tpWn dYk3MBIF6D6S4XhDVg8HWHXZrLQewZpLsAKi05plyNQ= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/41205AACA49B26FF

http://decoder.re/41205AACA49B26FF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123.exe
    "C:\Users\Admin\AppData\Local\Temp\123.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
      • Modifies Windows Firewall
      PID:2792
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:5104
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4384

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Defense Evasion

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\939p4pjc-readme.txt
      Filesize

      7KB

      MD5

      6fbed9a34a2fab13fe93249a33ec46da

      SHA1

      95113564d139c2a31ef94417b5717e6d08dea3a9

      SHA256

      a0ae532e4561f4d466fc74a9ef1bd5cadd4900118fe0bcd643c12f410dbf9869

      SHA512

      13948bd4e158dfe0bfa817518b28d233141b56c7ca84e59a01f9f277fbf935792ea20ae385b96d8313cb0171a77f8fc07f0a548da795e509f10090e466335987

    • memory/4420-0-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-1-0x0000000002190000-0x00000000021C8000-memory.dmp
      Filesize

      224KB

    • memory/4420-2-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-385-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-386-0x0000000002190000-0x00000000021C8000-memory.dmp
      Filesize

      224KB

    • memory/4420-397-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-399-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-401-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-402-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB

    • memory/4420-404-0x0000000000400000-0x0000000000439000-memory.dmp
      Filesize

      228KB