Resubmissions

11-04-2024 17:53

240411-wgrc2agf82 10

11-04-2024 17:50

240411-weydkagf52 10

07-03-2024 21:32

240307-1d2rtafd3x 10

05-03-2024 03:22

240305-dw4ykadb7x 10

26-02-2024 08:40

240226-klbmlahd92 10

25-01-2024 23:42

240125-3p3jlaagej 10

10-10-2023 00:01

231010-aaxetahb7s 10

14-07-2023 13:07

230714-qc385seh7w 10

11-07-2023 13:35

230711-qv314aad81 10

Analysis

  • max time kernel
    177s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 21:32

General

  • Target

    v2.exe

  • Size

    121KB

  • MD5

    944ed18066724dc6ca3fb3d72e4b9bdf

  • SHA1

    1a19c8793cd783a5bb89777f5bc09e580f97ce29

  • SHA256

    74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f

  • SHA512

    a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3

  • SSDEEP

    1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY

Malware Config

Extracted

Path

C:\Recovery\5v15b-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 5v15b. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3EA1A4E36040776B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/3EA1A4E36040776B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: gwXal7U5lDi3uQVetSkS3Y+yTlTlZcwYE15z/FUPZ3x311x8ZrV2ip3Er9+Ha+2h tMmOc+YvDpMa8i3RqUdG5VDbDZgq9gwAZ0iJMgy9L7Fd0Hb8SDvd7vuTkfui+mlR FziwUqJZy2JcoWSvwzFWUQzFiLxH8bp0CuJmhlHku9eLKuE7YNvgETJOdW/JSqhH lcHpG8sPsqu+djDIEwxb8hqBOjTsMlQUtba6NWNMBrIBVpEZKmPExzqq4S1iZWUp KbvZTDiGcM6HE50g3GZn1lTILEaOd8Dw8j7jYHtNBFwEnwfZQCf7T7LkuQudTBG5 hXBOeq4osRJEzqB4eMxHekRfyBX5bqWOWiUGziRf09LxC5G2KFhsELRbxkSXHbtW ijjX77OiUAsLMNQDS06gsu8EwNLxbkERA076RTLtNfdREyj2RfyEuAhPW7M888Vf 97Y3XlLgswhtLUULcforpj9Z4z8Bo7pS5L4HiBlv83sDvHx57nZJ8lqqScKRCUME qh6hrMz03AvPcor/TNtGYt7VbCM1rW/8C5nwnicMCFT4t4yjYvLr8vjtaSe1RO13 V99FnEn9Pmng5f3x5WfyDd2AxnuvVVHZaoZIzlv/f4xaY60d8Vj0LAD1uHyii+oW A07FevVz+RIW7rAfs2Mb19jLpuc2SYTOlJHXdDqbhMZ6SmSrQeMdvbsLjEPjC84A L/UJeb2A+m2kOjjp4P+h20NKha+ajSbvXwGwOY0U6dbWjo0qNeKgipO4R+Zn5pS+ rsVLbFyiXuVNYsAVh0CitlF3nrHi3ZZJGG3OCNOcLChhnsr99A9p3vQNcYLgX/wC DGHL9HQXywqYGSNH6WgwAXU47vNifaelc6onay1WMIHqQOvdSAI2wIftV4L41Y0G Y0Dwae0APvbezeqLUxYjl1MwcqOmYixkw/k13RPn5GJbnbWaycZ6iFIEDylOav23 vLk47lE10FOHuKm1JQpP+qyRaBul3iqIVgyBX1Xwn2VHCaCMDhOo1EWmS2fO3WSY Rn6Dd+zTGD7+ZJhwOfqu49hK+ZCIxeHBXp7gn7yrGsqpgU1ltuhDK0ccgDc4wgqQ U9CP6MJJOes1561NvuQNIM6cck1nIbYMto0FQG+AjsuK90RS/HmxQ8SSvbOtmSMu cYHTmZM6pcRqBX4ITA2CTmMNMp+FiGidFO2jToeZQ83KPdoXGq2NVXnn0NU4F7By nNr+cDILxS4LW4uPzgmO74A9KQzHRlV1xtqCUK6mbNJZj+GLZ36PjbYr4vj7IES7 7hHEiLs23tEliHUDfHET42YXsAnmQg7S5Mpu5ZdTQev+ryuwW9RU/HHOiVR6yLoh 3d/YxPPCqPeaXtrvPssI/5GMynY= ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3EA1A4E36040776B

http://decoder.re/3EA1A4E36040776B

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\v2.exe
    "C:\Users\Admin\AppData\Local\Temp\v2.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2912
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2020
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:580
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:760
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2540

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\5v15b-readme.txt
      Filesize

      7KB

      MD5

      86f1d4a565fa13af227f7b1353cb0dc8

      SHA1

      489552aae7b2a5ad86eac867d480fa10cd38a396

      SHA256

      323f89a778e4e820446bbb6e518f19cd13140c916a9c6fc5c0e2b12023b3c706

      SHA512

      51cef95225c83c85cdc949abe101aa8249540d217efd7f8ec1cada2026468717e8fc7a26fd6c3ca81ed54d5e1b63f474d94f78406d87659c15ebd0783c13a101

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      ddf066b94fcc01864d61ba538a610efd

      SHA1

      9e0ffd8e5998a7c7471aed13976ef417c0c6c154

      SHA256

      892de48366167be8476d551bddec1988586b01c26fa5e7546dc588ac3424a691

      SHA512

      3c696dc4cc5cd7ad6632f0e68ff8a4edd8f23be2a8f4d31cfe51f646defbd8851482d2c8b88972539eb17aada909e2aa2b0569e84423983d68192d2d219298f8

    • C:\Users\Admin\AppData\Local\Temp\Tar70B2.tmp
      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      192KB

      MD5

      4f85dd6d29f8605d0af9aa5ad10d9e2b

      SHA1

      a86508dac42e251fbdcd968d45cd3a273d26cd60

      SHA256

      fa7a2d93f3712bcd2a64f21ccb809bf76a6db3154c8b4f70f8ea00955fe709d8

      SHA512

      44123f509be96011d8909a815e7a7a0bc0b3560f23620122325dad4be1df43fb7208e050716e4b438ab5ab3aa46f128d4defdf7ff25ecd3570e6e0aa19d99f4c