Analysis

  • max time kernel
    133s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 19:12

General

  • Target

    some_malicious_file.exe

  • Size

    164KB

  • MD5

    890a58f200dfff23165df9e1b088e58f

  • SHA1

    74e3d82f7ee81109e150dc41112cf95b3a4b5307

  • SHA256

    5f56d5748940e4039053f85978074bde16d64bd5ba97f6f0026ba8172cb29e93

  • SHA512

    2ee3636833cd9b02f5e311401817b15514845d4c12c1416d7e345845f8084775bf8c5f8f32822066b75a6b627a93138a0b27deb99c8bbb1f8d640132a2d8de0d

  • SSDEEP

    3072:Hp5SexkWi1Lbi4eTMlwDCnu/q2GB96W/y:JvGWwbnWJ/yB9

Malware Config

Extracted

Path

C:\Users\vh61nh-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion vh61nh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/970A5184F6D10219 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/970A5184F6D10219 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Qwwba87lM/ijrFezqAMf77MuupxSqnfvVDG9Pc4lNAR7LDNvJfvbt3TfwdDuF8MY cc11B5kfY96pxUVSqFsYPSl7Ws+R1/JxzzQVzsqfy37JLWKIVJvIKOaymoNHZBjP Upy1FIIoFYzbueLJBBimUCAOo4Pc2Tb5QGfm9EvRMmO6MRhp9dHMVsnPzU0iyzUO qQi7Q3ZqvThlzzr9+HZVKuQtFLHxAaDZ8XHD79Yy0ftArDvjKcE5i7sSZ0SUfb7m rbvvohlJb5w7KHTdzzkyAWbqx5BKNviETUqXpM5+PhkCmz5mqYvlDwkwPJ56sJHl RAy4n/vx4JlzDiBxRts6hCR5TTBO0yalOrHdYe2QTyK1uAjgHcWXaCwS/k4zwpvw iOakuHV88tJ46ARjfPj8Tp+IhwjyjpcTob3EZnC2RiVQ8r5DfwJoq+RNRIobzoo0 KeoKN7NOTx17Tf2SRIjK3VWUFPGc40+1Xeu5aZDleUI+ijPNSc/1HIPmc1tpleqW XoTDvFydXtNO9T2iOrAfed6Sds/XLEq8vZZ2RLXpgxJYlWCjdyp2oCO53R69nENr b4x/DoNg0aMM1cP/TeuL/fXSR5FWfjcAtifwTf7uXec9peEY1AERiBTjhjbFWLN2 ihlHFCAnsaTtTMhcz5qX0++59fslA5cdHBIctLqzZMitP1y1SEipf08M7nCgf3o4 m4a62X5+FzZxnyAjX43te+wbPbWz8TI1o70JUNQ1fvUp1R5gu5OTN/2s5cJrWyAr OKcpm9vfKhZ9mu5JqLCdE/8U967Ob9k+gZTcbMivQ9ksfA4KmyaSytSkvm84qZAd 4H8c10xBcrPLnUtoHPgmf2/2rTSk6YVmhhH7xACPQnEEQgXF0ChVPlKvOSkwLGf/ GfR4bQ25Eub252hAhOdQ7/Q8hC3spCZZ5nM1sJZzq2lQ6RanZprgc39QK+yfFcLv guMBs+IUNdkqBmLWy4cDKSLSPAEq36t31drHjShEM8EIIOXpfybrixAjBJLLBw3t zr4DhuSaJrSUC2Rm1M4Da4NW0QPW21UEy3spw/WpekjdRYUcHaXTZ9wVXv0GWwHK EumncWpmt9zakDm28b88WSBappKqqA17WGsDVQM9/DYkzTeowWTytqSmb8SfPuap JmF7/+w41JyC06Ho6XWXbvqJXn20C+0C79dbcDFvzDYG8tshLkXeOOJwr+haq1Ey K6dgxeuJ32M= Extension name: vh61nh ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/970A5184F6D10219

http://decryptor.top/970A5184F6D10219

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\some_malicious_file.exe
    "C:\Users\Admin\AppData\Local\Temp\some_malicious_file.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:3020
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2308

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    77fa754632423b4356bcc624ec964631

    SHA1

    8393ad257dd9aa7816aaba86340078850328dad8

    SHA256

    7021b02dacff408a7c45ed73b1069041c0e31382c0b3539ca34ffa8534e6eb97

    SHA512

    52fd182cc60302753c01648146c8d2230db83789898c1760dda705ad27baee4b78a8297747236acd44b9076c7901cee19a57e961771a238b8152f53f9265a1ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ea3c771693b1d4f305ebe8b27bc62279

    SHA1

    c3585055b452535649ab471554688eb9c16cad00

    SHA256

    86eb9020f88e3108b32f2fbab95361d0505cd67494fe77f7d31bfba5d12c8b83

    SHA512

    212889b61a46d05cbf1c3dbd91548ba1ce74c1b34f0c685e9062b24445502dac2c5e5194bfc63664afdbaaa3da2d0f420c4e9668e9f87c1ea2298ba9c45a208c

  • C:\Users\Admin\AppData\Local\Temp\Cab12.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar54.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\vh61nh-readme.txt
    Filesize

    6KB

    MD5

    3d2196671f5873d856ace2aa295193f5

    SHA1

    98ce96170d979632cb344a9ebc44a0ff0add6d9b

    SHA256

    6f510a447407d010aa0da456c107e851edd115c7964f1e31c5eeb10dfdfa5f1d

    SHA512

    fbf2b887fd90e3e4664e34bac847a1fceb96cf8bbaf1890445fc9062c8ad1dc511217e37de18fa85b951aa122fc8fc167fe5730e5152444f7ee433923b740d59

  • memory/2244-7-0x0000000000190000-0x0000000000191000-memory.dmp
    Filesize

    4KB

  • memory/2244-12-0x00000000001A0000-0x00000000001A6000-memory.dmp
    Filesize

    24KB

  • memory/2244-8-0x0000000000290000-0x00000000002AF000-memory.dmp
    Filesize

    124KB

  • memory/2244-0-0x00000000000E0000-0x00000000000EA000-memory.dmp
    Filesize

    40KB

  • memory/2244-11-0x00000000001A0000-0x00000000001A6000-memory.dmp
    Filesize

    24KB

  • memory/2244-10-0x00000000001A0000-0x00000000001A6000-memory.dmp
    Filesize

    24KB

  • memory/2244-9-0x0000000001120000-0x0000000001229000-memory.dmp
    Filesize

    1.0MB

  • memory/2244-2-0x0000000000CD0000-0x0000000000D99000-memory.dmp
    Filesize

    804KB

  • memory/2244-14-0x0000000000190000-0x0000000000191000-memory.dmp
    Filesize

    4KB

  • memory/2244-3-0x0000000000460000-0x00000000004FF000-memory.dmp
    Filesize

    636KB

  • memory/2244-5-0x0000000000100000-0x0000000000101000-memory.dmp
    Filesize

    4KB

  • memory/2244-6-0x0000000000DA0000-0x0000000000ECD000-memory.dmp
    Filesize

    1.2MB

  • memory/2244-4-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/2244-1-0x00000000000E0000-0x00000000000EA000-memory.dmp
    Filesize

    40KB