Resubmissions

07-09-2023 14:45

230907-r45fysaf5s 10

07-09-2023 14:12

230907-rjbyxaad5s 10

Analysis

  • max time kernel
    131s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2023 14:12

General

  • Target

    40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe

  • Size

    164KB

  • MD5

    5117dc6337d71e68262ddc6124ff1b33

  • SHA1

    41890b9a7043d3d6300ed2a128425f321c69ea0c

  • SHA256

    40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04

  • SHA512

    71534faf779387a35e28f64d26a8d032c93f4273a30d0102ac8265399f198c9dbd119ae1e186d902ebd5b19e0c57094ec171bc101d5c073a75346f62d17fbc8c

  • SSDEEP

    3072:9fg0NBlu9CNTed7/kBazzFbULRU0pNa+eGfiN82R:9Y0NvuUN6F/M4qtXpNHE82R

Malware Config

Extracted

Path

C:\Users\q4324-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion q4324. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F532935A60F544FF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F532935A60F544FF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: DfWcgB8lsqBiqlISVsG+RlWIsnFf70qJseANqqX8d8GM9uvPoEE4WLTGiG1wwJ4g szAp6q8K5upTLwTXHmpS1+rRyh+xl4wX5jW8w0NWgTbaQp/HX//KBAH79fJ9LDzF Tsu5lS1PmY7+f3f8Bv3c2LXb5Nwi4EM/tD/acqmkRMZyPGs5bRjeStmWe26WYMea cik+eqSESiBlfWeoiwNVS94woTixXnVPNp0m78B541EC1NCZ15BCdyp73HD3DJcY Eaq3UylFwe4qgGqfylqNyL1Vcy/XPMrMI8Sm8r37ipg6hXil7st/kSx67M0eXM6u gkhhVaZ6Ozn1DzCzyzCWpeExSWTDQ/jXpElBpxWudqDQxYoLm5v9EG2nXc09k1bt f7zIl0d9cbNn0soUFwj8y+lZFGUdwyaPK8Kqs5W7kENOdVtLL5N8NaBzbldHoQV9 3LxIljSAZ3GySV6TEFpQ0o/7jgp9HMGx3hgQOky6k7tSsaypLdZCdrIgsPFA3a8E TBaPvhKVnqrmi3EpA6qo7Feuv3bOBLAc408E8YzQOCV+CmDr05wK2hLMvRqg4zqv 7N6NDUlLeNV6MvknX3aVpREWB21fT2PmgOUSauJUbkoHgHSYgmyUvk36EascMh4I gnyCVAhYHxEe1IY8c5L49jaT4xwVwcAtHq+0L8bbN32CRhgYqNl067vD92HMoyPA 40hR3U4NHtKhwOST6B6INIng1ROOTejIBlakeFkKsZGg9NSYpyxONdlNdJaDSVbQ hZYl92gIRtxHCM/mCLHbUk3T0bX1GT3owBbGZMkhLCiFQP+iSc2mWphKUiaNcBPV tshFnIcp/fgpU9IFiTRdZSMxtDqgKnALBJTdwyw9kAbjiaeHiwwRPUL2F3SM5+Zl FepiwTtzd+qDHn8bJI35fn9uu5m8gFaFKLLTwv/mbyejJ+p1+vMo35yndPrASG6Q umHUajal2k/xZ6YZhOsFCp6pBDztXuzoJBb/A4kKRAPcpCPsQrDgJG102AQHLMQR tQgxbSQ9NSDwDDnPcOBHV48+rMNczCGy/NoLtKHwZrdYSxXNk913fbGJl7hAYsHy CO+3UJe5Itwxu8FHtpozpr0mNdgxILuU9tfsQ6dwNAd/9OHI+OXcnqYaPkWl9fRj 1vvCN1wFPveqWlY+UROzcEKobACgcNLi2ht+QiPmjtQzDi68v2B6RwwVVm2PMb2Y wb+Nm/L9 Extension name: q4324 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F532935A60F544FF

http://decryptor.top/F532935A60F544FF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
    "C:\Users\Admin\AppData\Local\Temp\40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1136
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2644
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabED3E.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarEEB7.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\q4324-readme.txt

      Filesize

      6KB

      MD5

      497b1084a288bd3ac055281cd816ab8b

      SHA1

      1a2f882951dd966c6dad3c36a00034ccf7cd1405

      SHA256

      530cc26c0c784f166b46ac0303e2ac468d934514d8ba3cd868a1b8d537b2cf0e

      SHA512

      59daa3d2427c19acc1e2755e1a06c22c9195e49f7376ee34ecbd5cf0ab1733de31b9de0cf9b2ef32edef4751727430c88452d1b99094b4048466c56c36e35f83

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      193KB

      MD5

      523fc2c7b9b09463fc49fad06bf24feb

      SHA1

      3e11f55d0859eb88ff9ff100f5ee92c86dbf18fb

      SHA256

      d2b5d797d0fb9effe868d8ac461d162c05976d35b68fec289d97bb61f400ef35

      SHA512

      05db69afb5174046fa48da4969ed8f89f4cd0d5fb18b5ea23ed876969e8330cc90c5929985828eed5ff7d41b1da7bdc243c50d9f2ffeda1b2f9f6a213c890957