Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2023 20:44

General

  • Target

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe

  • Size

    119KB

  • MD5

    fa8117afd2dbd20513522f2f8e991262

  • SHA1

    f7b876edb8fc0c83fd8b665d3c5a1050d4396302

  • SHA256

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

  • SHA512

    2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

  • SSDEEP

    3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Extracted

Path

C:\Users\EDGEWATER-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have fxe65 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: 4QzOYzY/oNn1Rx7Ip4tEaVFuUTWpXaMej5o2LmiBeD5paITkguAWrvRrWItIzf8i Vax38KYjdxea/knBjSDJ7UkL1aFFcMgXTCYVd/sVmXo/maGnTYND1kEJZ+9n61P4 tYtJs4ZkKPV14h7U3wHoPvGaqxCxg4qsFKIXLpk5uR29C5lmPR5VCjUcalhCMtR8 PrGC4ve/58gno7zx8i6IIL0GoPfDeDrmO0XAMGi8nFh1+UAG4i7PY4k6gG7LOGbc IQSXo3S0w1575zTuq0Z1VyTZi7Oew8YJh0AXIvV8kxhenpWS5MBl9Y01X/hOPMDI fsbOAdh9rwBbgmT3bts5W66k7hvGZQAppjmeEdluD8jaXNMeXK4cHZTzDjbSHvaQ x0xUWaIYrepL6+oGCNmLr8PAQM+UBDXGoCTphGMd007ovGIj3Es1pYByFSymJPdq a1xugxEHydXROnsk4/CMV2y0eMM8R33ocbQUWO9tpp/gth0BiXBHMYM20901aByE +tEcI612ArOOeJkMnhF3V5Brk4bGiPPb/lYTfbw+iEdJxATtXMKy2U1x/zWkVDsn VSfsuoKHrOagvavH9G7XWxTM9FZg35JE3f5Vn++SDh9sGAbpToa9NPWIXQwa7ljk PUheMwJV19F33dixtV88XZU+AX/oZEZCrSNpwymmoS4W8KwDh3fMrZ8OMnY3cuT2 8+zoxJqxUbGDbZTByGDJNxxm8dtCFixm+cNhHNOUCz8LqpV6Nyv+YLNVHwtglmGF dsF9ZuZP5tuMNjHIrlh7gkbHRkSbrPxpJu2xOzZ/Ta4HahKozh4o5wYHlLgi705z ujewL0MW1E6wbXBHwN3E9a6eAsNoxpeyvJ1dXoAedDp45B2Sl34sGDA8InTL0vtK Zlp59tDZzvbuig9nzZx2niRsgssU5/mDiRgaI8hxDKawjP24jFBx+ojBRlZhZf2b Iy4HQsE1QZThc7MTX6iVQ9LifrJkc02t6pMC+jmUrdWP6U+cMwMnfmIsZKbBdJAS wy7d/bNUs7ZWWPqqDYhZpx1oVfA67xEXp/8OmZWKLcE6cHU59m+FDlYrLKYiVAKJ kooRHYSfLBHjXpW/gM+/STvAD8VKDAjNrE0uSf+KhZV2nOMTjKFrxGYOXMIAGq22 BC7UtwPaTRZ2J79nBG49tLIEpcgYOCvKOu8Rgt+XYUNe0Mo5H92sxSxNo1f6jQwV dPkCisq8SvA9qIxKKYYSMj12F3J2UzhXz7MdjUTHp+m+/YvQV7QGtJPFBdGZ/GOD oZZU1J+d+7pdg7ic+sulenSkDzMGZmVTBxVXH385o9bfkNkBoOEpBJI9Rammzi71 1AWGhPByXbLOqEV//K/BeHgWpe7wG4dVSCw= !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe
    "C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1064
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2708
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2744

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\EDGEWATER-README.txt
      Filesize

      6KB

      MD5

      b0393fc3e4a1193404ef2f94d43e2a40

      SHA1

      67b1b65f6bbbb40db87f340f177a442790569a7b

      SHA256

      ce4df21b2b8c063b8ca4329c656bc4894f62daab92c52ca3a794bb1c690aff46

      SHA512

      3da5bb8672d9b6f325001cfb312b376873a112eeb4557d4a7f638fba82ad2c8a8df1942df5ba5e5896cc86dcb8227ba94e5f2fab957edf5b6c3aaca5d0d28d8a

    • memory/1064-10-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp
      Filesize

      9.6MB

    • memory/1064-12-0x00000000020E0000-0x0000000002160000-memory.dmp
      Filesize

      512KB

    • memory/1064-7-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp
      Filesize

      9.6MB

    • memory/1064-8-0x0000000001ED0000-0x0000000001ED8000-memory.dmp
      Filesize

      32KB

    • memory/1064-9-0x00000000020E0000-0x0000000002160000-memory.dmp
      Filesize

      512KB

    • memory/1064-15-0x000007FEF5BB0000-0x000007FEF654D000-memory.dmp
      Filesize

      9.6MB

    • memory/1064-11-0x00000000020E0000-0x0000000002160000-memory.dmp
      Filesize

      512KB

    • memory/1064-6-0x000000001B350000-0x000000001B632000-memory.dmp
      Filesize

      2.9MB

    • memory/1064-13-0x00000000020E0000-0x0000000002160000-memory.dmp
      Filesize

      512KB

    • memory/2968-14-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB

    • memory/2968-0-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB

    • memory/2968-1-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB

    • memory/2968-470-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB

    • memory/2968-487-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB