Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 21:43

General

  • Target

    2024-03-29_9ef9a8497761db7ffb2d35c150a376e1_revil.exe

  • Size

    118KB

  • MD5

    9ef9a8497761db7ffb2d35c150a376e1

  • SHA1

    b1512c25ab74d1b6e968a9ad6deb1ca17e2a7728

  • SHA256

    07f13ae44f7dfe796d27023a327d5f3e8c615ba9c897faa35d21c77eedc32f55

  • SHA512

    55dfee7dcb56f6cba38a61eeae5dc569b50f6036fac1afb6f81c83051403d1d25a700ec3097da0efd4daa18a934cd74add875e43c22d57ed5e85a65e8ea27a6f

  • SSDEEP

    1536:LRp9QsX29hfYI63FRRMjjXpuAin2LDndpeKCoICS4AVEiyVc2owUtQK2QWwn:K+5cjXMWDn/UDELc2ojQP

Malware Config

Extracted

Path

C:\Recovery\WindowsRE\3pc92-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome BrightKey Inc. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 3pc92. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAEC3C51F8184C8D 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/AAEC3C51F8184C8D Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: i0gQR8QhQhNhNStGfr5/l96m2yOB7h5+PFVj8IBZL8TIFh1/5DTM1unmyHb3XhuJ 0IWBWDTXDL5E0rb7ingJ5b8Y7nNMIsBIpFCrlY9083BhOkCWgJeVS2307l3XUbF9 xqmW1MQ4qgyxuiNe5HXEvxmVpuOt2O3uDyTEA0IybXOeVJiUZuAk5ABG+sCarch8 C2a8zTnCwwEjDoTR5clZcjwui5/RKmMKYanwd2+Riqp19CQd1XBRDXvaHcLY0j0Y NHfpQk8XWfA2g2X0ObUcuwuxe3IMBoBWQcvE4syGBPuj9cnGleJHp4kOzsn+4ICZ Vw8f8C1nApdUwVqOZi8YXT1IzSpDq2W9cyKefYPr8VN7rLK1rp2CrmP2CusMhykU 3hi9iWLB21jOXklRaP9uZsSV8841n64SqAlW7pLquY2TDvTJty0i0MYSLlAF0PFS J3Kj8xYbUxSDxaLBMWKRpZQV7nFE0lxx/tvImpLzd/lYaodmTlYjEtRyBtbTPlHq BDGOT83MNNoHaLTc5uOTeLHzPWazJ2k+n65xjjEDcyha/U1AsZ2P4JpNMX2ZK8/J MgHqh8AiMWlGCILIFp/KrKh9dmvJjF1oZktml3VmiMqac72t7sf+oAaqmpfRAIsk IrPLLeuh1BtrFTQd28rtIGyC+Mvk+D+jlJdNF4/CniQNRANMR6gwMN8MIxKFJGAA v0tz3iL6QducJzoCJ2ea3BgLkg2RtTDlVgeYwayMNAZMo6kqefwki1B1erDV6ySO rKKLK4kAIP0AbULS037hWMoK41urYig4QRsvsRY16P9+f6Go8tiLpLnUqXtQOTcW EiZXDfESsXNaGZ0G/oeAMErxVVP5NSunTPg4XBXg3NU1D3PWDvcmkIH33YTKIv+i Toigoix29eFexf+dC4ltxfNzl+gIodRd2T8fH1UeSmF3n3KT9+u7zZCTKNdFM8Ax 2CXshNaNkJOXYT7RULH2SbDCQwQ3HZA2R2zZwmA3gDQYbF3bI7kSIU8c2jdhGtVu qUWzNSXQ9A1v98xoYZXYVGIdvDJ4uzh8AxCYudey4cLrU8CVGfaP+yy4I5LmLcon VgQhO8wgPHiQJZPiVlT1gphSFBaJHpqM9RXQL80VzIgY1R+kqE8UHUM6VKTBEn8c f9B0tYZQSDaMEtB4gdtj45H8ovNeVll8Ktn1Zw0J4TxslC6ofIyFpiZTG/m1ag3K yEI+8w4kmvXzlvxAqid9b/cVJyUox0EOrxRzOTXRJoEXmBVfH0xBmdaDEWy92KNt 2FDJzwG5QEQdtBeCB6XnEzwnc/spF+RDNaRfnw1Ks65tDN6d8yO1qIZvu9jNG3Qe /jZHULPrIRLLKBysGhp0P3gvSodRzVef7dBUtZX/aJZgq5/T ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAEC3C51F8184C8D

http://decryptor.cc/AAEC3C51F8184C8D

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_9ef9a8497761db7ffb2d35c150a376e1_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_9ef9a8497761db7ffb2d35c150a376e1_revil.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4592
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1180
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2588
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4248 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Recovery\WindowsRE\3pc92-readme.txt

        Filesize

        6KB

        MD5

        b7fc305ca7fda7fb642ed0687d3e1f72

        SHA1

        20b92d1affc08487f675627602439c9570052ffa

        SHA256

        44e67b84855efe5022ff098ea92c28f5633a2009294f8cf9fe35b7acb549fac9

        SHA512

        b97fe7f6f2e758a4208733b46346080434b50679755eb8b84a19553a96f82550d714a13be94015b5978ca56b06da69fc60fdf4e51bd539a4c89434e56035bc10