Analysis

  • max time kernel
    139s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2024 13:53

General

  • Target

    17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe

  • Size

    164KB

  • MD5

    ca337c7130eef4f4ff8e8a4a8ec28647

  • SHA1

    28558e35d3f9af01fe438eba7fba1c38201c86de

  • SHA256

    17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467

  • SHA512

    60b9b7841a942a6bcb700872b6ff1353fd282a7b318d6ac8d47e419573978aff43c961436a2fdb6a076e81545ef9759e7848fdc9eaa5a571638ab19d666a1c1c

  • SSDEEP

    3072:LBVn11HzIOLbi4eTMlwDCnun4XbZIt+ypUF:d9jzvbnWJnu14p

Malware Config

Extracted

Path

C:\Users\qbrnt7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion qbrnt7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/099B0EB5E1BB44FF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/099B0EB5E1BB44FF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 9CKING1kXXK1DxkNQIoXaPzHdLof89QreHjSRDdPjeoYuTRCDNfmsu7h688iZBug QO6osSi13kYnipIqgsnz7gZJ4VuGU+EOSVYecY8z6araGSAXskXDZF3eD+yV51Rq wuKtacNmOw41pkJVXzup+fU4cx7a803QjSyymJHGT4xgQpxooqfjPavb25A8b7/U bX+iS95UaAf+kNimn1dhZkwZhwjpcruiZwwbL+V1GmjAH8ThZHim9Wr23yNVBJ+O /zdOGar6DNMc1vo6cGu3vR+1txOEviDHtnCdDa6VKpa1vlSAh6tEW0pAtuQs1frA EEyM7rYhLwdf9e0Uud/uj7ZIyB3rpKv0e1JbEUAi4PX8IPpVTR+HOQnpcatTB4Nl 3yS7DujG5TWGAFpQZ83hA52Qan/+U3GvpF3dVxZqHmneUA21bzJ4XK32YnS7BvJB K8xO0L53lIApAE1D49ZORMTKcBf0L4F6SPcjUsdb6yFPCnlI60Xh0lV+0raBjxs9 YSmvuLyb8awsomAKk61sSMOSPvBzPCFSYmrfRHE8xRi8ElKe0IwbBLp0f2A8laIb u4MbNVgrB7Y30J8cs7UDAItVeE4R2zRuFInQCg8A5KyAMYdW1P/kO3mfrWk2df1J VVEoCvGX49DNvPfM79SnwJJ8dhBJdHA6DXkz7yEYTiamKinE/SfiWqwCbIKq1x5o aUdiDmJux4yTzNM1LVGnYmXsEdpheqIOTFI+HkfuPXHPpI5rguFNsJqQTaWvrB0k j8OONCNd3vHV8SovB60qdL4oADoUfz6A5Rugcz365rqkYBpJKYVLfkP96H1W2m4y +xY1l3vHHGXWUgR/93QP9IdVKmU5oo9Zdh7fQmjCKo+wFIDtVE+yyUMjPws2DIkU 5J7MmTM3WdMGVuYHWpXq6I4EFFadNlCpsq6T1N7W3cE6aHx+1zCXNKIybsAoKxhc gN9Ii2/oj2xm/PrAYKat4yib7Ja8/+VRY0nm0yesL6wHn4g3KmzP7A+8eD9Ddeg+ YkltzHM8fKqa8HXBdUxiaOe7kBdWRRRmW1LvfuYQf0kDZ1PgTcyCoxbMXn6+n4tk l/LGPWjsv/9rDypxDTMZsSOqoL2R70hoKQ/DXx45ZTr+Oa0OAEJY/7Ua/DkAn3qH yu1GATJdDvqMXWoCfYh6F/4ZyWLlL2azOT29zt2bbcUexgVMwhRS1t3UkkFveiqI NkTU3YLFDm1Qxg== Extension name: qbrnt7 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/099B0EB5E1BB44FF

http://decryptor.top/099B0EB5E1BB44FF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe
    "C:\Users\Admin\AppData\Local\Temp\17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2068
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2552

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c1d55a47a55ad1693959e75d2ce73d26

    SHA1

    48260b2e7940c8a2d6713b0edf853e6837e4bffb

    SHA256

    d1b9d970d31ecf4fc5d4e25f40a461ee2c629d81867d8ddd5b1718c965f1555f

    SHA512

    0b75641d2f48e67f81a84ce9a8aa0dea3729938cadd50c06f276da19926d20d1b102b9429bb3f4d88c30c5b056a9fea33e10371e12c7d8f215678013e2c6cadd

  • C:\Users\Admin\AppData\Local\Temp\Cab9687.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar97C6.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\qbrnt7-readme.txt
    Filesize

    6KB

    MD5

    634ffa2240408cf9443b0a642c49bcae

    SHA1

    34da01d1d359cf835cafbab3ec63fd2201abd3c6

    SHA256

    e9e84e2ab52145eb9758250e79826a66d6eea9236a54b9c38e7d3270f1f4a680

    SHA512

    889a5c20740b67e1c1bf34893704bac7aea9568d02a9e74edf6c20ffc4d9d63baa3a498ced3f2e671abae4769544ad55dc0256290666b23a8ce1a1b6118bf4ed