Analysis

  • max time kernel
    115s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:36

General

  • Target

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe

  • Size

    119KB

  • MD5

    fa8117afd2dbd20513522f2f8e991262

  • SHA1

    f7b876edb8fc0c83fd8b665d3c5a1050d4396302

  • SHA256

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

  • SHA512

    2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

  • SSDEEP

    3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Extracted

Path

C:\Recovery\EDGEWATER-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have o4kqy807 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: SfVWw3HCwTmMoFF291Xy4o46ebH1OVuTlxfrJeUqVrCFH1qF85pEhaQXFkQD6nlU TC9HI0FZyWyIyfTZCMzx/ni7S1rOrqVkgrISDawAPJDv0lSWpo4EmN4I52RQLyaz BZPUm+39nzKqhqN2BqnlWjoPhx/pTYGLyS9onYUe/05c024jFRwuM9D7Ns1hp1TT yEY8cPmvHOQQTh5HOEc5SduJPIc6UU0jSX/IVm9hqhLbw81LxJKjU1svrBy0376m C9fm/J+ATco8SraiXx5580UaSkMYATMxzEv7WtGbZ0EZ9tfBP+AvxSf41UWmv/Zg +tPPBcsvJvH25yXHerjnx61Pe1BnqXKAtsgjtf7RhCyt4L9VrpNmqawNL/ftezz5 4Fr/HnOappuqPx8qp4WyXmoMtEQx5TBeLmYcgfuSDsxCvBoIVGG5YV/gCSbBrHv4 8UW8Y2KG+qwmpoGSN9MTwn/42n7wOewnc7GxuzjoucM/GxMH8Sve2n1DfKEJ/2jh uEw+ri1VqLfs9EpVcO6DkAsp0aQ9nw1/aJax3zS+otTnDbj/hZp6pFZkfb2lG0ev kmUdFk7r2NHraFgRnVjLdNzRsBYCBof2s15FEup/LFCFGaapzSFCeQO1lpH04N0P JU2ZdmIOuN6iUa2a1SidOL46j8So1vZBo66aDwHZpMOqn08dPN2jfHuZG+lEXMKP BBGO0M70NPw+h+VjhdGgEmRywxGmcIUrUVVQk+P/vckUVG4bZShoTm4KQ0nXJPbp xyGNS7jIhAI8bk1esK3UZdWKeTmL5LfBeJoXQ3lX5Y/4tCU2JtZHZp6yNI38rqrB ilP/kNVDLycrreqwVkQE2mAIugq8IWPTBbD2IiaYkwwjYNktwmHdQyA5t4PmWdY3 MDbP/9jUAQ+gJeSjB5C7YwMHK1ayYgpcwCJFxgvuYvSFiS7L7FSH9h9C4u16+wjn vAcSzHwXbvGQj7AxcwfrvIzMkY0JmiQ2sP+iZrGbBSvx6NKfeoMn1Gttyggpeexj 9MZ8rfD7YpY2g23Ex3x6JvaUJBY3BnUjLkOpZhXcgLdlwRcY7idwAbOrHEueCRDq 8D0eHP13UyidbC6fpYjfhSZHgh5NRQ/8HCsVRGnVxmxQyhqyGiWl8o88HY4+ujPl AjIIP3iEmBd1xVJkEUtR/Qj7rdPZ8fAFcioZBVfjG5FO1ybFYpJA48uQtd9oYoxi TKNDdFXo1YIcGqxkuInSLSnQdNameYYXmQwQM7ACmeAQ1Dtjg43YjwOqlFf1dbyc FX9GrABxLUg1dQgwpiTJpgH5AJuR5JlP1Y7M5Uzr+9yKZbeR9yvOUO8m613DInfp RwavdhQuw8b0bWibbsYS3QZG+gg/XaUDdpgtvI1GOh38CeydvqM= !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe
    "C:\Users\Admin\AppData\Local\Temp\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1412
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2208
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:968
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3524 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2228

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Recovery\EDGEWATER-README.txt

        Filesize

        6KB

        MD5

        d2418d0a59d5c810fb0767aa014f35f2

        SHA1

        86ec9b19be978d00cb351227e08579942f9542a6

        SHA256

        22c720e369a2c791ef0e572c081d1911b1abe7cdd7792ee4c22f97a4909563f3

        SHA512

        6d867b1c8dbf6295786902f394059ee22629950810129e7b4b9dca8fa73cb3060c6f61b420550a79f12a77af830d2936a7b74d20a0118506c6b3a917719b4770

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i2es0bt3.vpw.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1412-7-0x00000133C19D0000-0x00000133C19F2000-memory.dmp

        Filesize

        136KB

      • memory/1412-12-0x00007FFFB7FB0000-0x00007FFFB8A71000-memory.dmp

        Filesize

        10.8MB

      • memory/1412-14-0x00000133C1A50000-0x00000133C1A60000-memory.dmp

        Filesize

        64KB

      • memory/1412-13-0x00000133C1A50000-0x00000133C1A60000-memory.dmp

        Filesize

        64KB

      • memory/1412-17-0x00007FFFB7FB0000-0x00007FFFB8A71000-memory.dmp

        Filesize

        10.8MB

      • memory/4596-0-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB

      • memory/4596-18-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB

      • memory/4596-1-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB

      • memory/4596-210-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB

      • memory/4596-399-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB

      • memory/4596-416-0x0000000000670000-0x0000000000690000-memory.dmp

        Filesize

        128KB