Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:57

General

  • Target

    17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe

  • Size

    164KB

  • MD5

    ca337c7130eef4f4ff8e8a4a8ec28647

  • SHA1

    28558e35d3f9af01fe438eba7fba1c38201c86de

  • SHA256

    17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467

  • SHA512

    60b9b7841a942a6bcb700872b6ff1353fd282a7b318d6ac8d47e419573978aff43c961436a2fdb6a076e81545ef9759e7848fdc9eaa5a571638ab19d666a1c1c

  • SSDEEP

    3072:LBVn11HzIOLbi4eTMlwDCnun4XbZIt+ypUF:d9jzvbnWJnu14p

Malware Config

Extracted

Path

C:\Users\5e6ss7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 5e6ss7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4DB2A44B74C43238 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/4DB2A44B74C43238 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: VwvQiT06XrpXlzfyjVFr9TZVL8j9Xl8iN3isW1GITTEv1XAZfoYnM58V8Ei1Z2KM CbGMGBv3O/9HMYCVY1bd1tvBSGO4i5Cn+I5eJTiUW/EV3j66J+2xGf6SoAP7Z6YT 8ub7FQh5vFz4P4lkQfL3e0CFvDEmbsEPXl61O+Rg68V4bARrc1RoFn6nABIKefWy 6KGiwrQh7rBGyXSqw7miyfuRs8KO7CjjwBTNcFKnHolDnBQs1CXrQD6jUDUrQmmz 0ClHwoLKeC7N4tCMo751xBPyTkKTstE3uLNIMKOsYVZCuYU3mUg4VlHLensknzVE bj5IFo+ZeX7fL6craWOOKqb2/lVtY2yWxrU4zyj/O40M+8csxuTuicyNMXmYA1wY oCUhXnX+sVxYKSHgrg1YhnEQwPVJii400pJjrTfz7SZLyVEaeecaYdlaaDfK+J3d jKdSVOi/nUNnGtyZoVRyjZFCWTP8vjeIdMmJzzQjOQT7vkg0jf8zbw0W7pVrXxMD aMUv2x2kkLZUdeXUd7q42xya+d11eVcp38h89FjvKdTgN3ntjqw159zKRDccG/eB 1KiGvdTXfxpArzEHptEOBoW0GI8FqmkKr76gWxbQ9eEa+hNaVpcep+3g4M5Sh4t4 psPef+OIvHbCct8ZzyG3SgJQdtwSIYuCv0lZAegvrh/v8zPHva8gM/RpvI3H3/y4 E+jAdkon4tiPV6F5vi5ze4hftUsDjpBPmZ3JQHw30zxJzDQjbOXZJkg2ngKLYgKr 8E+o3JI2Eo3BACup2c3v9nbwPMyf/qNXItWd6bEDIGZL5QO08BXwvXrhP22eTLdi fuLU1jmDm9AM04NVk2S6V777HeJPUmEef73lov+aTptCzH/iePEnIwefH+nyPSI4 1zFHdwI7EYG/7srljmT436ogpw6yVoRl2xmgLZcxiIaQp2Bf96+YM1ROot41pv3m OOjROLUNkMP60bIY9AQZkS6cyMBB7RHVj4q9eM2MNqdvdbLBnSXGr5zIcuUwDPN/ 1t+7dn4SX4GV1tgc7ihGpUMXvGJf4NBNK1wVUVc501Hw8lFevIWNlSfu1K1nKepA nBzCLCihcHh+BHmzGd55mcbiOhH+Wkjd77QCmyLWIKhWIkfIZE+ZlVtf71GoGp04 iN8Sktf6TGtqaV5O1/gJFlb/jAQaoaCaVFEy/JLHEvqylAML6FpsEDGqeGGnq7n7 pNvhm2TfaPxMG02ih2cURQ== Extension name: 5e6ss7 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4DB2A44B74C43238

http://decryptor.top/4DB2A44B74C43238

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe
    "C:\Users\Admin\AppData\Local\Temp\17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
        PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\5e6ss7-readme.txt

      Filesize

      6KB

      MD5

      76c52fd8f766c210e5d407f38de3d63c

      SHA1

      3bdfd9a2555c2c801518778572110222c3cdb8e0

      SHA256

      9eaf76cc954e2a2b64ada09ee80e8a545da7d2e04c613797899329fd4590ec16

      SHA512

      dbafd2ea09becf891f56f78cd728281e0c70eed59f821f3ec308edb2d0245c6b6d2c272d1932f6b18667946fd0c027cb0c566a85fdff891e93313131bf998293