Resubmissions

07-09-2023 14:45

230907-r45fysaf5s 10

07-09-2023 14:12

230907-rjbyxaad5s 10

Analysis

  • max time kernel
    130s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2023 14:45

General

  • Target

    40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe

  • Size

    164KB

  • MD5

    5117dc6337d71e68262ddc6124ff1b33

  • SHA1

    41890b9a7043d3d6300ed2a128425f321c69ea0c

  • SHA256

    40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04

  • SHA512

    71534faf779387a35e28f64d26a8d032c93f4273a30d0102ac8265399f198c9dbd119ae1e186d902ebd5b19e0c57094ec171bc101d5c073a75346f62d17fbc8c

  • SSDEEP

    3072:9fg0NBlu9CNTed7/kBazzFbULRU0pNa+eGfiN82R:9Y0NvuUN6F/M4qtXpNHE82R

Malware Config

Extracted

Path

C:\Users\48t15w-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 48t15w. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/46E8EC66AF7F37CD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/46E8EC66AF7F37CD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: sYoAuNwu8txDdr0LbHOh6diEwoWBNnaK9qzQbt3NJEQucD6bsmsGO1wod2g3UGqX b6wRyb0MlIrKPPrCYdCtsh89+uJjcvC4y2Oa/tJCyOoGsY/NiBnfYYEYNPo2CCRi LePbZ4dQOftXxvSaN1+zxjK99g+8UlxXVsaFsi5uHXk0Xlu+sqQA97zoqUdrCDV1 VEoSmfu5dUi3wdoVy4ZD3StFBYvFqvfvBA6O9stXZ4vAXew41mGO62kTCc+v/Fse 41o4wfNWRKGYB+UR1BDIWY88GDE68y2p7Dn2qHY35KUbPaFBCCHC7pTCs2JLJwHD 9TI52gMgf5X73Wr4RaPbIvpqHmdXWLTPVZM2K37ouyTvfexBNpO8oUaes8BXzzrX j4qg9+qfic6H/f/v+QEVtBrdp/ACZxI5WhxQHiC70qKWhO2uQcmb1BVob3E30vH/ gNwg+c7kfz1g8RIOoQQxifvb6cnYZQH/LjZMHxHa2HTooTz0yDNnhNmvIHOqdwcz Qtl7cj03OJx5dyQM0acdRp/R3D4VQK33ledJKxqiDIQeNHanhUNBgXOcNhohHiRC g/JJYHwBXYfSfnmeEmxHw0Y6vfpqNy56E1ptOzbcxU9XH5OXyiJrWxZzxUzzziNB T3ykIx4VvWiTL6G/jFX2kMbKCVmXtniwsmEnZWlhatXauIO+nr4vK5lVvtD1dc23 HnccXLY4Qa2H81SA4a85sdF7F5fBxmKak7MP1sMLW7gCSuzkNtazk9Bg40xDWWii 4Dafa/r3+D08Dg+vxHJoA7MOIif4nwo/qKyHGd5HwCCmRD08RbYonjHGseyAI4ai dlH39up5ZRTacuvdiUva+/+ewowKeco+QTauc8hY8ox+lJnPKnEBPVSOG8gTs6Rm BGoqumf+yY8YDrvth26i+Huok/JtMtKIW0uQ02onykgZjEo/NkLTLVgGfN6FPfr8 BHLTUXBZfjMST3EaXyyq6K4h8mpFH6ioo+YTzjF9wuvXnfye+XVGQfKUK7iecKvB JH4OE4UyIKT1Prp+wICF42PNgR8CAtOcwh+nzmB4ZuutIwfMUN72fnYUYYMEiZVx 4fciRf9StssZISEv5lDZ0IhKzqvY1qAyzhQmeTrYFSQSwctyMiYwM7FOKJadtJoM zhWb17ctwdTJnIcRNgn2lTPMp5xFQn01nyQgxQv0hxyQGJw6Yq8ZK1KQPo2xCQub Ohk3GCBmlCo= Extension name: 48t15w ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/46E8EC66AF7F37CD

http://decryptor.top/46E8EC66AF7F37CD

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
    "C:\Users\Admin\AppData\Local\Temp\40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2796
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2120
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\48t15w-readme.txt

      Filesize

      6KB

      MD5

      d442934addc312f03a0ba4a1deacf4e7

      SHA1

      8df9fcc827420d2de41dca4b92e1e0caa560bd73

      SHA256

      2cd7647b1ed4625d8976a06369c4743a7fcc2ad2cc48419d1d3ea9f6bf7bdac4

      SHA512

      814aa8a089e9e9814b2da122675f04cb7783556526912e18a67f39fed240f0a73f7ef3645d39f4803d754ce274da3a0d894f2351526f3e94c25d0ae2106b6147

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      beb0f17eaa7febdb87eae6f365c09409

      SHA1

      75462e4f8bbd063fba88335bc8afa305ee1694d9

      SHA256

      62bf721587f7133a986ff747fa66782344429051f62ef603a535035e35f0e8ee

      SHA512

      f6989c85d2827ac2e49ed49139457f373e4483d64ce4164afe2fd42f681fc1fbdcf474aa4e639ae313e5884cde088622e7594e9b96dc513c6dc5b47e3b66119d

    • C:\Users\Admin\AppData\Local\Temp\CabF182.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarF202.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      192KB

      MD5

      aed7ead5631febadb66c7dabb495c153

      SHA1

      d9b98eafda33a84bbca58d494e50e77064db0745

      SHA256

      1c0849334858fb0a3d24a5aac5fb3c28a751215ed556cd310f8f425209d1f0c8

      SHA512

      8219e3be4505cc9979dc5fd1e0bdeffe145d149856f9624a899ce69ed86533c5bf1ac0fbb57491e2a253588e4fe020fdbf26f4fb23ed7f62195144f85348844a