Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 05:28

General

  • Target

    2024-03-13_0fd7b39007dd0128d605a53c2c82560c_revil.exe

  • Size

    123KB

  • MD5

    0fd7b39007dd0128d605a53c2c82560c

  • SHA1

    ef056eccb7b6ff584c9b97c84ba1967fe70b67dd

  • SHA256

    6b0a1cb22ee55ca177d81d9ae311d03b6e10aaae8e3ec5dc1c7bd7f03dbf37c0

  • SHA512

    2cc307ea8f3e25c3b8d34962d7ef4be87bcb8cdeb514610711c12d03b31752fa7e941bd8d581595b9fb25969542f64cb752b230d9b07c47835dd2329571c9e8d

  • SSDEEP

    1536:7DvcP3/ThpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOxF:ysSVhaNcYMkgnBR5uiV1UvQFOxF

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\l6949d7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension l6949d7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8579B47079642092 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/8579B47079642092 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: heMT2hKTjhDJhx4HSsIB/fGnuKch4KLwMMJSfMn65+2bK8fhOdhEP85SNLixctcg 5Nd7Ll+oB4irCaD9Kw9a1BGiXB81iBUX1ZwLQIcWlSTM1ZnlMhF6ulS+aFNN2EGN Ux/sMrUYCYirm7GVVtm1mV/bmRrv5iAOiItpj38Go1IX7/lcaJzC/q8G/4kxWHV3 o95DdXysiXQUIJ94dccwZPtHdOKcPPA4usisZsk/zZJ4S3/LMlnoA0T6/c7J+6i4 e/oYYcHlmDpGwFr+x+ZqFnsNSU7Fl0Mwg6toud8g1yK/v+94AAQMkxncPeJo/mYB 2ayr1ImysQju8+gjiV5jj2CHtKS0waBN3xgdZl+awUTUfTXs14Z8t39jnOgkwI19 o3yj8OsBG1lEWHh6u6GVWiyhF58X1agdbKWjyQhjECOMYEB4BRv2QZPI6ecKqgcc JilxLyPyJt3tFNv4OzplFVJpu5AxMmVWU6fSgaA1l68icdTz0mxf7nlIAOxYL6zT E3YZirmrOwSOSbgYupV4HPJ2+BT+MRtCu+jyYFbjI2Av9GBDOUlN8sC8RNL+NhZ+ ytZ+coeWJ6Wf2l2aZZG5eU56DXOu3vC+LwuK3fucWQh3o/mc/SbeqJrU5kzwrJVH 6fHZKSCRXy9RzOeagqt+RVj1ZwCIahFVQCBYR5btJWTD0Ajt0K75PVxhf7d8qIyh bzhPlj8x4Bs0sSWvg22fPM7atVJpZZca7JehpQfcYZodc8LIas9sMHi0Hj0qpiBa q5lSGzeuCOyhi0VSUCVBrWxoupHiSw0DNFORODgJ3N9uLqcoUINtoerEIfMeq5m3 g1zD2egdi6RPjy2VBV7NF0MH44kRYX3Ywunl/Fb0WIOda9ii+YaWPSHcmTp+ImMx XCEm47LpcDtqyZLcwxhdqghqA4Sq4+g7QqexMV+loYPJcb3isaCrAoIcFOruuMeg jy0NcmF5IPzUhc2PzsJQOZN3CJMF/250w/hq1Fp7urR02M5H1g3tXI8laK5lK726 fDdDOVmCRKzNV25ZAQDHV8YDCOd34fsBJLPgk2N9cl7OCztA4AL9cRyhdhe8MjtL f+dlFd3lDpiZttfPi8Z5l/Ws7CXiRbzEHC9T6r5EQ2gPWPnXRuz6Kql9Ysfp8w0s gckjRQ2rhfGZ4foJ9xeuXe8Jxff94YHIxpV4/ByioApHjurMSNNQQnZJ8vS6EXLd 6kn1+LghXvbfijexH/cjcjFIQeOdw9W9XL9xgumIzyQodpP+6KbIVh5oJlyO6eYg 8frRvBjHt18OGHEM6g4QbE2N6EMc7+UKpE0lpnygYWueKMZojTfmjQfyUcNGgFrQ n07Qa93scliSL+eOHT2iKyK7SBIKXylsb+0PCVKbzTYThQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8579B47079642092

http://decryptor.cc/8579B47079642092

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_0fd7b39007dd0128d605a53c2c82560c_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_0fd7b39007dd0128d605a53c2c82560c_revil.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2984
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\Cab5DAC.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar5F68.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\l6949d7-readme.txt

      Filesize

      6KB

      MD5

      a593c747c8f92d1273739f089d77fdf4

      SHA1

      364c7683daa3e01541190fca53019e6ba2c00b93

      SHA256

      3a370f977e2e138ae688d566d48802f0e710e4097176662a6aae9577af41d926

      SHA512

      41443e0a37e752a3273cddc21cd641988fb1b95a49f04bd146948e5b32d1ac18a270e9bfbcba9a48477d093a4e0b177a2d7e293330a09bb7632ec12be57248d0

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      192KB

      MD5

      93f3aae05d3f6b1547dea4f8abc49cdc

      SHA1

      bc01c6fa7527ed221a2141bddf9f07fa0821ec20

      SHA256

      6212db5bb3dd1837e66c8e48337ff82f0dcf8516cfd0d8da5a7e118044486101

      SHA512

      71f3a4461c4b48d64a9eed6690ed010075e3023620629aee94885f820cfd481a47a46d7334d5617749439691a6f4b934f2da546d4cf596a12a8a8dc8179384e9

    • memory/1936-0-0x0000000000C50000-0x0000000000C72000-memory.dmp

      Filesize

      136KB

    • memory/1936-516-0x0000000000C50000-0x0000000000C72000-memory.dmp

      Filesize

      136KB

    • memory/3060-7-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3060-12-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3060-11-0x0000000002B30000-0x0000000002BB0000-memory.dmp

      Filesize

      512KB

    • memory/3060-10-0x0000000002B30000-0x0000000002BB0000-memory.dmp

      Filesize

      512KB

    • memory/3060-9-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmp

      Filesize

      9.6MB

    • memory/3060-8-0x0000000002B30000-0x0000000002BB0000-memory.dmp

      Filesize

      512KB

    • memory/3060-6-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/3060-5-0x000000001B540000-0x000000001B822000-memory.dmp

      Filesize

      2.9MB