Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 12:56

General

  • Target

    42c28feb23c992a350673d63413bf11bc816d00a079462ab524934219d46430d.exe

  • Size

    166KB

  • MD5

    43e9093ffc8dd69985a9ae65b26f5551

  • SHA1

    7b268ff84e824ddcd8b7df3cf9993be012489d01

  • SHA256

    42c28feb23c992a350673d63413bf11bc816d00a079462ab524934219d46430d

  • SHA512

    118d879750d0456f5b2e31818815ef9465fb40eac24f4784236c626d2a2e753b5a85ec5b2c66a755b10855c9caaf77bd85b6b3d1fc7003fb029cb703ead9037c

  • SSDEEP

    3072:1LFrb30BRtBZZg+i2ayy2RjLTuVyu7CJDgoMT3QG9BEJfMt0H:ZJ0BXScFy2RsQJ8zgG9jt0

Malware Config

Extracted

Path

C:\Users\bm02qgl-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension bm02qgl. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0422D02648DD265F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/0422D02648DD265F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Mep/TV8VjPH2oKt5kJfYOO4pTtw95cmC/v8tI9rcxshPFLNG8HlTLhHuvhIIs0vL Gh+xZLSfhNVMzT1OPQgWLsDpPWhJf5KrY9XugdKJpmSv0c5BkCo4e/3DaoGAYR5M KRTp3uI87qnWoOg9ccbyCKd8cTA288zOk58KMPsAnk6lCvXJYuXigx7scR418CTi tpaPPoq/RBkd9MiOLFyz1I3d3LRzyqRvLs78WWT9indOJxAFXIXhTBoeTOxpBwAD VcaZR9ecsoCjXsLWVJW8IMAIF6VJk6o3jke+bkwSCwNOpzPxQm/chfuQSIUDMfwu leXQazTicH/YEe5c7DXJQBXECpN/f5OHw9sawp5WZ4zw2XWnchxVxLsrm/d5AlRa NuXh2dDfPR5/mwfYQsZMfSjYXSAOKsXEMvTTPLE69buvbCh5ufO24IJklwkf1zQZ ydXdBbcHbeMWMH1yvJT4RhuGrtLwAOlR9DItpCrD2HZk+y/FObLmZMvnhy0ja7qX Wv4YVHOztU+La2cBm3Cw0Botr+8ulYkLLK5CrGYEFZ83cMmG4u7Wf8wVGVNlDHlx BVfjG+R1Y4mJhPvj+7YAuA9chMKVlenQVkPlPGfxs+Z/hP1d4UvGhfyshV21CGzV Q23WirAOWGU75V0rE9Hqkm2HboayjtPcMpQEEFUhY6FNoMA/jV9R0SROtub5J3zq nU6Se3J6bKo/cguAFYrFsLvlRv8GKOHGOhc/Q+iZ8R9BZhFjC2Rb0DkuCz7zHIrl W1i8zDz8uu4zie2sI1XtSUB5ZWmXUH0wIc/F0EefQd57azbo1RV8TK7IPMMdegiL 9GVYHxLNDs9ZdBpQW4UXypc7b+mgX+fTLoffNLPf4FCkhutcrYT98ERaYvoqjATI FaEof7AX1tZ9jUj6OggTD5haIXrPT8wNlO4scVMZItEZQlSjwMqPbepDDYY5k42R MzwadeAKNeqXeWANkt3S2anGPrebigmRxIGT/3n7rr6alcLIlx5f+od7+knq/17e fuIef5S5kYUh2JQVaahT0V32VRW+SPTmqwln1kEbXcY55UU2e0+xax6b+px89yfO IZhMRVNJM8vBu4z4XC/wjuM3B1zA0vsnkRcY4fkAWit9MfpK5S1l00HxgTlzfEpL tmQjm31xadXzR8cStHDqzBJNoSDsIIUGzmaCB2mFPfVTBrRJ5rPuO0DDvgZtAMYA YjtD4KEyj2mfTEgwdxeKAd8kof0= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0422D02648DD265F

http://decryptor.cc/0422D02648DD265F

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\42c28feb23c992a350673d63413bf11bc816d00a079462ab524934219d46430d.exe
    "C:\Users\Admin\AppData\Local\Temp\42c28feb23c992a350673d63413bf11bc816d00a079462ab524934219d46430d.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4780
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2944
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zn531qyb.nse.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\bm02qgl-readme.txt

      Filesize

      6KB

      MD5

      26d5c6b69c3cd7c0326ae2bb62b19bc3

      SHA1

      6e708c9fff7975182366522f5f8e1e4e8c8c371f

      SHA256

      e79fc1c410e78a93e0e6ff36dbbcbde29e349f0932c0ac0ea856417dea0b9a1c

      SHA512

      adbc938794db379568dd34d401a7f42c2a2eb3e24256070b9ac1b000b247053344095fc99e8f82724b581cffd3740b993d9e99f16b56e7368b878c0dd0c687c6

    • memory/4780-0-0x0000020B9E320000-0x0000020B9E342000-memory.dmp

      Filesize

      136KB

    • memory/4780-10-0x00007FFB73FD0000-0x00007FFB74A91000-memory.dmp

      Filesize

      10.8MB

    • memory/4780-11-0x0000020B9E380000-0x0000020B9E390000-memory.dmp

      Filesize

      64KB

    • memory/4780-12-0x0000020B9E380000-0x0000020B9E390000-memory.dmp

      Filesize

      64KB

    • memory/4780-15-0x00007FFB73FD0000-0x00007FFB74A91000-memory.dmp

      Filesize

      10.8MB