Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2023 17:03

General

  • Target

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe

  • Size

    119KB

  • MD5

    fa8117afd2dbd20513522f2f8e991262

  • SHA1

    f7b876edb8fc0c83fd8b665d3c5a1050d4396302

  • SHA256

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

  • SHA512

    2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

  • SSDEEP

    3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Extracted

Path

C:\Recovery\EDGEWATER-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have pm451t extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: ZDTXo2wBin+PvJwWrGaRV3FotTb3TET1FquxKj2DocLM/3jb79bCYFjhKWxY+PJ2 8riO5VbImV6bMXC4ATPSYTwjtVsecmHr8xqo+xDFsMQdTrtNLYe8Af/6z9R/d8IA 1IVsH7jTbXQFCdhuAfT/QD3sLc+9vWwZ+G9bmlLICzm41Oq5m/hjH6BPOQ5Grvee s0En3PBS5+ZuNU1qZg9cEvg2WiVvinp7M1HX7O+MXpA8SFYb9y6XjchuJGTrcCV2 uX8emj7AgIsfg7z65RlwwKdHVv6/tr1O6q18ijLbhsYqV7bShIe300s74KSolGwS Vw9daugl56tt3a4IHbuWtoocWEoJdr25BEH+PKkk8pcIRGpOy3U07Dbw3oajDJnk i60weuQMs2eBE+/gHZuK1pJWUE25tzqfyO/E7ZrhXA8gAsr0aV4j95JXwyROiKCt +mA15p0Lf1jzxpjVw7IRJ6Ja7Kz9BcJnRtf07Qo/SJcTlhuExm/iDC6bXLLRaFpG 3iM8W+OHuy67axo3kLyBoNaLXg/vF9uaLoT7zVHNDMgQN7kxbUz/M/q284PHS1B+ VQkXxtHMOqia6NDKcjOqAog0IHePbrO9Wlz0G8B2fKfkXTG2G0TYYZmDKwCNzv1W fBX3lCBoxl8LHLZiGgwwOOEmmCXlx5ptEFLnDspUplIusjvW8xw4lEnm2xcRsUuR fdLcX4h5CmIuONS5SVQ9panFkDUtbhim5iFLxy4MLzM7C4dzDDDivmcjCDKHW49W pgpyLtgAfh6IGqd44M/S3OYQ4WUMF70dsi3OeX1DW3olRf/Rhyyk4kI+wod2jzjL aoV9OwuLKDnSPv3KGhysA7pQ9IQYa8VCJ9W+7Tw7neeoYhBBOMGrmBWzD274Rpfx NP+clbuUFnyjOrTL4ZrutDo0ZYgiL9nq+GtpGcCkr9qdiOY5BPtxQq0tAcOdrhvW DiveBhVml7VjdDcm3MAGwdwvUE8XlaA44K5ojTVIk0eh2Yp/NRSJiBpJRN14SAxz m8JM5fFa8W7j84mNO764/jqsY7lh7vH3zgpNS/BD7G/Un6Bsr5jsgGGzo8TsczZO zI7su+KwinM/qPWeu2hcIsQMFoe3DvT+LodtTbNMRm8EEtod1my0HVSdfAfX0TSc ojXSL5BmBP6vFSS7CDruWEmYsNPnp4Pk5W5oT9nxH1If2UGWfIzBd49dKkSI+KsQ DOpyPs7r+AtfloDbNqwpSp6e2T9qRqIE89wulCqhck9P8n6tzdauWkcZkL6RSnka lakBVP+AuCAa+xjtvFxZxAoIcm2S2k5AJxbqFzBByjflG375kt5E9dptmIy7cDgs 45QNmIOO2PZtzzC6EBol3ecEuOq675qkZa6zNP7YmOINMw== !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe
    "C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1224
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4132
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\EDGEWATER-README.txt

      Filesize

      6KB

      MD5

      c918c4f07868f4c04e75177840cc250c

      SHA1

      0f9bf66206303a9f6b0f578009627ab1e06cce81

      SHA256

      272c8d9620a1dd14a9cf661ce65139b57b4e3ca30df1c692691311a14699208d

      SHA512

      c8c0572284b1c7adefa1af66547b75523b1fadd1478afa761d6825e7db7f44ee2294f6be5e5e9b8aef76d75b305e99efcc054b4d5288c744b8136934c2c2ee1b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h2kdt5li.4km.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1224-15-0x000002BB55AA0000-0x000002BB55AB0000-memory.dmp

      Filesize

      64KB

    • memory/1224-11-0x000002BB57D10000-0x000002BB57D32000-memory.dmp

      Filesize

      136KB

    • memory/1224-12-0x00007FFAABDC0000-0x00007FFAAC881000-memory.dmp

      Filesize

      10.8MB

    • memory/1224-14-0x000002BB55AA0000-0x000002BB55AB0000-memory.dmp

      Filesize

      64KB

    • memory/1224-13-0x000002BB55AA0000-0x000002BB55AB0000-memory.dmp

      Filesize

      64KB

    • memory/1224-19-0x00007FFAABDC0000-0x00007FFAAC881000-memory.dmp

      Filesize

      10.8MB

    • memory/4388-0-0x00000000001D0000-0x00000000001F0000-memory.dmp

      Filesize

      128KB

    • memory/4388-16-0x00000000001D0000-0x00000000001F0000-memory.dmp

      Filesize

      128KB

    • memory/4388-1-0x00000000001D0000-0x00000000001F0000-memory.dmp

      Filesize

      128KB

    • memory/4388-394-0x00000000001D0000-0x00000000001F0000-memory.dmp

      Filesize

      128KB

    • memory/4388-411-0x00000000001D0000-0x00000000001F0000-memory.dmp

      Filesize

      128KB