Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 09:05

General

  • Target

    2024-04-22_c377c579b7f357683d7f1508d6d53bef_revil.exe

  • Size

    123KB

  • MD5

    c377c579b7f357683d7f1508d6d53bef

  • SHA1

    54a6a96d41334fbfd0840a1682ed1d868fe85918

  • SHA256

    2cbeb3bdec6e2dc672e6cd7c14b01aa15a8443c0f7ce7022963207ef58d7dea1

  • SHA512

    c05654a07568740abd5dc57d0374caf5181cdd7dea9f6cf0ebbbf51e77f031f765a2780ae414c0cfb7783ef311ec5f35eb223953166bc4e3a43c17f50058c5a4

  • SSDEEP

    1536:7DvcP3LThpshwVs5OEbyNcY/p+2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOxV:y4SVh5NcYh8gnBR5uiV1UvQFOxV

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\2l343k1as-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 2l343k1as. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4FE4675406FDE538 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/4FE4675406FDE538 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1TSdksHdKAf6tp2t2FoMKjLbRWtzmq0k9nDTJ8thhPSOsv4VnJ/m6x9lM8KGBh1a RQJxdVaJb9cvmtIkE5ncm/r+cB3EwIYncM7HFdPHlpdxAGcCbG9vlnLKiId7hGXi Aq+gxBrcc1Dtxypohdit/OvNsSbxXabxbXS1aRxubAqFmfhmX9dMUD9i75dKKIjv g8TxC6tM/RVSBorL390mOWQdqtCosRWQq/hiAG/GMYghhi/jT3A+WMzsnjn/rFp1 1i7TrqYBX6azNWOl3YDS/FYGh+sMkj1Y4Td5yMvMkjGSacr8TQTk8bf9gwnGVm1v HQHLSgmVgnO5bkPFp568/+xaqsITqG16V9RV5xLO2XYsvTLTHQQjzAl6u0qP44yZ mW+4MpMO7/onvv+dQ8uA8gWqYQZBssO+xvKvukjmThxXShlG3WOuNVr+N5N4Jblp n4/+674Uxb248ZrZ1DpCTrieUT/XLAafjPMvVUeFQdUF/Zv2qF8nrbI7NKEOWyPB V1ws8cqzTn0BzNiLg4FbfSmSdw19JqK4OJ5hsdck7+80uztGRlOAhttM3obJ2iar 4NGusInNN5ukTCU64QzNSHC0dT8qD72GbL9GnE57wxRuY2H4o8kj/dzS5aNC+TtC TcSB07aEVaZpeO8hMSSDSWa+Af1wr0YEVntBSDKmoJN7nQOeamL6Ji3QZy4WJ3eA p05NFGXwFa21eEwpU8Ju4cKRA2HxZ2xZb9/SxorXhgGwNlHi9/FeM9HTg+Tj5coK dwGv19K1GyogA3L5UJQczaZrdiS9IFSSLgaL+Ii6Qo779B9CmrGvu8Z51az/xuuo urEH+XuUg2lH4msxS3bvHwt9o4bh3XD9pZ8GPavvzVTTANBN5DUrx+NqaVu3Jwhv y8P//73+JUB0nMZFttGEhmteub4PNrM/qYwYOUao3uCeW1IQCpfwBeE243BhYGJm O77OvA3FmfZvvgksEeyNstVlcy2tIrGj2RUuninA4B5BA+awsxQd5XEGpSeIClJf qNcURXhxgTs+LBc09HoigyNML/29AMFx1GjRX7/KDiVNmST9I/tuX1M3cHz3ut4d Gq6dqQVjk76vLBCGVAJxPHwQS6pBTmfMaOu4FWKVnnGSU8xHCwZ1YybQsP5r2dy1 c7ato/Ob+1/kZS7cgS118cXwBRBlTcIHwjAv3LaObTFKkDhUxyS5L7oPzj+ZvIYe an3Q4r56B2mlIdKEJTHGAMMqodk9WoHKsU616whJpNl77EV4ELpKQ+QB8ESGmgM9 8u/fp0Up1ueREhiQ6o/vKi/CTIY/kIakbVFRmGJAOwTl5fdYf25PS8Wh1dVcTXwI qGICfzqcy+f9PCejEIci/KxOzXmSE8pmBmYuNfx35bvgEvBQii2z97rkCkY= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4FE4675406FDE538

http://decryptor.cc/4FE4675406FDE538

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_c377c579b7f357683d7f1508d6d53bef_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_c377c579b7f357683d7f1508d6d53bef_revil.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3464
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4496
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\2l343k1as-readme.txt

      Filesize

      6KB

      MD5

      a05382efa70278971ff47956feec3701

      SHA1

      023778c2fed7b1cd7639380d12d7ef23a0090fe5

      SHA256

      b8ef9b9e1bd7b95a5c74d18707eff50e100a4e7899889329084a6f19b62093b6

      SHA512

      7bb9dae501a428c1224d07e688d27c4e6d5c60ca16e31e80562d8fabe6f27537a9e22c07553519bc69876bd30571ce535b3056369250c0476d2f3e4103805af8

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o4k2fdxd.yyi.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2644-0-0x0000000000570000-0x0000000000592000-memory.dmp

      Filesize

      136KB

    • memory/2644-442-0x0000000000570000-0x0000000000592000-memory.dmp

      Filesize

      136KB

    • memory/3464-1-0x000001E327D90000-0x000001E327DB2000-memory.dmp

      Filesize

      136KB

    • memory/3464-11-0x00007FFB729F0000-0x00007FFB734B1000-memory.dmp

      Filesize

      10.8MB

    • memory/3464-12-0x000001E340150000-0x000001E340160000-memory.dmp

      Filesize

      64KB

    • memory/3464-13-0x000001E340150000-0x000001E340160000-memory.dmp

      Filesize

      64KB

    • memory/3464-16-0x00007FFB729F0000-0x00007FFB734B1000-memory.dmp

      Filesize

      10.8MB