Resubmissions

11-04-2024 17:53

240411-wgrc2agf82 10

11-04-2024 17:50

240411-weydkagf52 10

07-03-2024 21:32

240307-1d2rtafd3x 10

05-03-2024 03:22

240305-dw4ykadb7x 10

26-02-2024 08:40

240226-klbmlahd92 10

25-01-2024 23:42

240125-3p3jlaagej 10

10-10-2023 00:01

231010-aaxetahb7s 10

14-07-2023 13:07

230714-qc385seh7w 10

11-07-2023 13:35

230711-qv314aad81 10

Analysis

  • max time kernel
    48s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-02-2024 08:40

General

  • Target

    v2.exe

  • Size

    121KB

  • MD5

    944ed18066724dc6ca3fb3d72e4b9bdf

  • SHA1

    1a19c8793cd783a5bb89777f5bc09e580f97ce29

  • SHA256

    74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f

  • SHA512

    a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3

  • SSDEEP

    1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY

Malware Config

Extracted

Path

C:\Recovery\dq67c1h-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension dq67c1h. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6CD58D914EFF79CB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/6CD58D914EFF79CB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 64XkcPwp5KdHl0XlJMe9iUsTqI2G4aIVkOdVoGGITbV9864alX3WUkv/PxsoFafM l3FSIPZ3LKaUAYUax0NhaSudkIknObQ4refuqQgSVpnDKdlBGxlfvqiDI+e2OK9X ah7OelwWzxa3ITnfVJLizum/4adkNQNoL3iWvMzkokWCUe/D/9A82MVYRAd1rTQi 4jmeyEYr4Q9q/eSTsznv6DZWc1Pd7sjX9A2tEL0CmXudFojKYCx4ShV7UFG4mH1e dhSsnrO1IYHxkgJvVggKaPvYKWEzrgfYfTanWanVR4Nc3bqZvKwhf9sE0Ocfzz3R wfF921ebdJWoUUt0l4mvb3rbpJS55pCoC5SBgLgZMBd58frs9lO+6aTiqQN3NTXT CzxmWfp4dvdjHb073jVIXzYvbRByRIWV48wMJLgvumhnR2G01kpTIQgSdESE7VEg elJsOeMR+f37Q7MsytbWz0ubVNH1ADLC+8nbzjTUjE0uq30bIj+DcflF6IQ55cWt Sc9Du21ofNQIwOV98pmvYIISGmTkVwRKakxQXztJ+pk0hQJmJk5Lro2CJu+RTf/N m9KgDb9Unpqt/3/ADiaa1T0ig8AQjR8WkfdWj/AAfRrdMTHSSJd53R0+kUyay3ZQ o2Ry/99v4Zi3JzUwawpYJZyGvnhuzubGH6TpPs+CMPxGMg19aksByshlH9hXDqGE styiFJvKlKu6fUebBpIg5mr7jbws/VZG6hmb1bmaDzNbQ5cKn21BFDUbr+4kmmGU g1v4GBPCpFL1gxotvFqFRA9nCcXdqrudNOcKnsDtoXKHo7PRZinI4e1NSXsK6nUh aAC29XgDGcZHbENLkBFokQOJV+vKgey4gz4SNnoMDb4YyH2Dr66rIvsRuud0nWKA irU9FpVT4e1KWketELoA4CDaRyAR3dIqXs3N2G4d6HX6C7TjgyicDeAwJ39vUu4F mHwY82JE00T9O6PBmSqhp7IB6cz/qZlKNtD6pJu7uGeUOubccdzZ5xr3nYHUE/R/ 5zZYT7zavVBnzv+065hITCBHuWiHsDjSNlEOIf+VngY3oM8KwR5UzbNejSMg2u5Z TpPtDGNuk9wiMw+tzkwkezxVXaFCwutOZypk/lKIvCAKBDCVilRjma9PRzxoa5tR UafmbDTywBumFSGr0kUTEFonUCeV40Ea+q/vw4gtnkkUJc7A1931smOWeAvctbVx vMWBGH8cwuEGSaytCWX+XCvvG+e0ck2w5BO+lbhmih1fAVridmDt41RCL8UBX23b /2sINZ5cRFtPrlduzQ4YA6ejB2WEDZ5kH/nHP4PYT/r05EJoZEUQaUE9+l4xPiX5 hFdKaIoaYrkc270gBzOcK85CGfuVj4Ur ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6CD58D914EFF79CB

http://decoder.re/6CD58D914EFF79CB

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\v2.exe
    "C:\Users\Admin\AppData\Local\Temp\v2.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1956
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3004
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2556
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2952
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\dq67c1h-readme.txt
      1⤵
        PID:804
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\dq67c1h-readme.txt
        1⤵
          PID:1920
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ReadExport.mpa"
          1⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2440

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Modify Registry

        2
        T1112

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Impact

        Defacement

        1
        T1491

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Recovery\dq67c1h-readme.txt
          Filesize

          7KB

          MD5

          1bddf87af0d343ac6392f23ff01e34bc

          SHA1

          60c2e91ab79cb18603d389199490c5b5069e9f06

          SHA256

          474e3a82446b569cb9150b8bb572d256c05999a2a2340a1a78cb8c890454e37a

          SHA512

          86e8e31fc078ab7410394cda73132cd503a6d1fc37d3465586784180321fa592664a4709cdac8b613747dd5c098884b3779424d8a2274b1661c775d354252b86

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
          Filesize

          242B

          MD5

          dca45339ca3024e0b1c4a83a4fb20fb1

          SHA1

          cd4498d16465c1784f55f77712a9bdc5551f3ab2

          SHA256

          8c9b30710727762dfda9bf3752092c61e623f9b6d0d6639487f8de3a0bbb4302

          SHA512

          444b15c0c18443206bacc70b741bbe7d74aa83a6bb21323710fe114e633e1926ef98a3541c7b4c49e9acdf41ae11e326f3c6ccbe3969be844cac868230f4915c

        • C:\Users\Admin\AppData\Local\Temp\TarAA0A.tmp
          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.em2440
          Filesize

          75B

          MD5

          abd44f6620f7c84f5bacd51e73bd4d49

          SHA1

          358c9a05b5b3944fdc43831094aa2b8ca3c82010

          SHA256

          98ac364853ef51634a0a9851caf2f2ba603279aac4c82a15dd35ab65b2ee3e36

          SHA512

          4aacfe1e0e9981d56a8bab88197115128f417c6894c3cc52324e356c03bd24a2d84df521d040f8fa1a91cefe28a8658b206517bf30d3a0fe9c8aba64bcf3545a

        • C:\Windows\System32\catroot2\dberr.txt
          Filesize

          192KB

          MD5

          cd5bd2de905cd091a9a0f87e208e7849

          SHA1

          2cb3e76cad47472afd6e89d92cd35a5e99f5c8c1

          SHA256

          9e6126142666ba73a365a0525f46093a3589fa27b9362981e645b2333487ff09

          SHA512

          6cdc453486c24a38c8c26a3b93249c3e9bc1293d9bcc34894051f28ad719b7efcfedff4d55381a9272810ea89a28817630af2a75f0fd53c7e5aa41eb028adbd2

        • memory/2440-2531-0x000000013F530000-0x000000013F628000-memory.dmp
          Filesize

          992KB

        • memory/2440-2532-0x000007FEF65C0000-0x000007FEF65F4000-memory.dmp
          Filesize

          208KB

        • memory/2440-2533-0x000007FEF5D50000-0x000007FEF6004000-memory.dmp
          Filesize

          2.7MB

        • memory/2440-2534-0x000007FEF48F0000-0x000007FEF599B000-memory.dmp
          Filesize

          16.7MB

        • memory/2440-2535-0x000007FEF3CE0000-0x000007FEF3DF2000-memory.dmp
          Filesize

          1.1MB