Analysis

  • max time kernel
    130s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 21:44

General

  • Target

    2024-04-22_c7c947baf8491168f624fe50e8d5cac4_revil.exe

  • Size

    123KB

  • MD5

    c7c947baf8491168f624fe50e8d5cac4

  • SHA1

    e796104c3b833541a36ec64f6c9ca74e4be8039d

  • SHA256

    9d0c30089eb6244a30e12e7cec291a278145991a9caf5e99505e8a6bec049cd3

  • SHA512

    fee3d00d67b4e4ff69da5d2c7fccf9325590c1ad41b7f19e12ee5d2af746c15c30df1b73fef3ca00e0740a01f62d6ce4ec8c4de72146e9b8f03a97dfc7fc3187

  • SSDEEP

    1536:7DvcP32ThpshwVs5OE8yNcfQp+2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOxn:y1SVhaNcfM8gnBR5uiV1UvQFOxn

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\o79j46-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension o79j46. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9737C85F9D9FC51F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/9737C85F9D9FC51F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: dRFoFKli6T2NWbl1Jmgr5JmHwmE9trYIp12lyGaDg3y4rUa5c5Pa/0TgTctWWa5u yHeTb4FkYDvpeo2pqlnyuMh9RD94EmKu9cZCewZGMr7KjoT8nIzr5B+3rP7cm4my 7Gg2vzCA4nFiIKqxUWq6noThbU1tFtFjWT4C2HY+7JaZSM++GcqAeO+eIQuft9Wg cazcvi5cLX8Vjutl3+gMwhCuWAWVW0AKc7S0XV+eHsmiVZQFHfayGHfoob9nx3YW 12uG3tWIn/VN9mxT/KHkzcTYCUiCBRmu9a8tNgSnu8R76cPDO1OQndt14QQ9/+YM umbHIaLyqGXRiukxuWgHH1/Dk+8oAvhDp0Gbxxe1/QMWZS/fgpPfdMO88pZ+ycJK 73cIHLpqKCL8J3BWr+DjKvTgsD5UyqjQOdDwh5kgRQq6Gkty+77Z9BMu6xmfpkrL redToi3/N9Hjxp+Prjk17OOqBw9xImns6qo4mE953XVtpC+3LoqQgBimKMnAgtO7 EMu/sTIcQO0cvWTKe0JWo3mlb2gHeJZqAk9yciGPeFTxxNGLQZK0lGv34hLNNOnY IssPJHzbnAPUURKCDJU25Uh74JnSJkTBVvYQPTVkrBF3xEbYhN6ERpwRt2LxDh9o vRVtJuuHlZCEZ3m7bMKFP11uysyvPfS20C1LS1N4J6jr95rXODX0fuqk9CBYug4b fWA1P5ylBQhp9/PYGwqwnLLa/xWS9A+hsubkXMRQkZsNm0FBDGXyXMQHTCNnSeUW OIgkIrQav8bzYDeXKyLLALCqy3p5tuJepvEnRBV06YfjscJqPG515yZ+OuD93K1/ TnOF0IZcBi7IpiRks5pcRUiW6HCea4vJ+6mehEEOz4jNmJjE+Z1Ck+RUvRfXpDE9 5hXBYgrxj/qaSjt1MMl0/EbMlZ4eEHzQaH5ev57hL17fZxzDpvrnSpR8qpfm7lUs k6GsppCwvEtdGfG0ZYdyfs8jkcauinPm2/CeGJ5XWDODgVxMcpOgEnkqltvJplXL h3kMtxjrzdsmsLCvszljuKdrmxtkxU23qngv+Z/wNP7srQAV4pecQaBdJ93uFyv9 5O374jEAyQF50LyUeo/Kn/TCt0j4hDK/HF/w8nvmsrEJ5o1t7UrKC7xwCSeqn+qV 1kPs1tJmRcu1+juW/TnjktjGPQNqBItnpdFzoffAejqu35OkULJsfPR5ntGDMPfE CYhs7E6/o83gQSTZq7swrqyNIF2+QLckjx3xtfjKspaM/R5a4pTnWIe4iSceItxK 9Umx2fWAHJgu8e2RkPCbf5h9de8AEFv/HCszh66RNbdDzZWu4t0VAgp2az/fVE+e FeuOiXBGKMX/9pAop+F69FzIFCr/Uf3YSS8MOSxQGq8= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9737C85F9D9FC51F

http://decryptor.cc/9737C85F9D9FC51F

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_c7c947baf8491168f624fe50e8d5cac4_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_c7c947baf8491168f624fe50e8d5cac4_revil.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1032
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3060
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2580

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      d7d477f7990ee9322c690bd27e6e5543

      SHA1

      66431bb6f8e2214c1b22312eab367c20720eb25a

      SHA256

      7b6277ce248205804b37a035f70f9b1468700cb2ae5152fea3cabdd4f1ff573e

      SHA512

      3c43bd0e3a93aea81c4eb2d0d785fe0fcea335a88fb5510576bb1af4bfd3732b8c87e8e34663929e07df4479ddce90ac44e69e185827e600ba6eb020b6df2824

    • C:\Users\Admin\AppData\Local\Temp\TarF108.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\o79j46-readme.txt
      Filesize

      6KB

      MD5

      dae7dd5c2f2f76a0b3a16123237959d5

      SHA1

      6c97b46854dee4c841b1999f363072288d84585e

      SHA256

      beed995a23eaa28a418cf6d6f5d32cee74aab615c9a7a9f78738d52810a4a8f4

      SHA512

      237b518f3cc7e4d1fbf2a472c9392674c72b9a02942d3ee0bc98cfd0fbbc17b3788d078ab1b8b02bcc1ee8014058dcbe1b46dc6a8630b436c6961e54ae3dea4f

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      194KB

      MD5

      0bafbe28006fc77cabbeffc680da62a6

      SHA1

      c395f52aa3fe4ebe67082f01070505ac124600b9

      SHA256

      108607380281f38483739e8e9ec7110d6157057029b338437123392334ef2107

      SHA512

      3fa203e5814362438363faeed706b86cd05fdf0db0f2079d1b66a1b3c33c9ec6a7f59a89e017ce0d09f5bbc82ba0bb9b01c4c36122912d5187b2ad7bf69d2a1a

    • memory/1032-7-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp
      Filesize

      9.6MB

    • memory/1032-11-0x0000000002AA0000-0x0000000002B20000-memory.dmp
      Filesize

      512KB

    • memory/1032-12-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp
      Filesize

      9.6MB

    • memory/1032-10-0x0000000002AA0000-0x0000000002B20000-memory.dmp
      Filesize

      512KB

    • memory/1032-9-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp
      Filesize

      9.6MB

    • memory/1032-8-0x0000000002AA0000-0x0000000002B20000-memory.dmp
      Filesize

      512KB

    • memory/1032-6-0x0000000001EF0000-0x0000000001EF8000-memory.dmp
      Filesize

      32KB

    • memory/1032-5-0x000000001B620000-0x000000001B902000-memory.dmp
      Filesize

      2.9MB

    • memory/2392-472-0x0000000000970000-0x0000000000992000-memory.dmp
      Filesize

      136KB

    • memory/2392-0-0x0000000000970000-0x0000000000992000-memory.dmp
      Filesize

      136KB