Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 08:48

General

  • Target

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe

  • Size

    160KB

  • MD5

    b572a0486274ee9c0ba816c1b91b87c7

  • SHA1

    43a904323a8583203b307c622c71c8ca706c2462

  • SHA256

    15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b

  • SHA512

    77d4ee400ded4b4be92da0170e7d2c197c312089429a1650e2843d0ceb15402d14f7e4fc3c2e84f20eeaa24995f0814c2106a37fc4cc32de7dbb4c15b6c5a171

  • SSDEEP

    3072:tp5SexkWi1Lbi4eTMlwDCnu/qjUt7ptQJS+s:HvGWwbnWJ/3tTQg

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\dq0q64i7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion dq0q64i7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E4F63D30C210790F 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/E4F63D30C210790F Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: g/rqEFI9Srvpy0xO5HvzZ/r4UWBX50IDnUVJfo/8gP3C2qz9z/P5dXvfSreI4XAp ooBXGZ/0fWQpPAfN+13qSALWMu8Zd+qaAGotiJCK2enEJ15MpC5S3ocg+LC8XCNk xjTY8bcEa+n6gvvl7XX0BJj4Gu0kQO/JB0JTkyU0qkWVxqdFwaQEXGrBpCTnpxOL tsb/AgRiBnHHd4f1KqXeToFpkwBUNmwZjXOfBRr+GrDwUwt9k/UDLXSs2fZZwRCy 3kvSrwbtrWYlpcJN3gjEd4m/V9Np9cBQdnlttjUBSMd/+z5TWD3JzcqsrTzRthBT BhZllOKC7TElFdI6J6HrRshi+pnMV++hJVsC6lrdJx3+3Lr3nd6TRfZorXNHO6zv cih7CSebYPOAit5LVUVi05ESmxU+sr701CQiVKyMBuBVbzPkxahYKrTMyXQL6or1 TMmL87DdILvXMVfeuVvrH8Wxqa4ufg7GmAshndzEiT+TppqINp5Yq+BGOLzEoF4k c7FBXEJewmD0pCGv2ufC1wupcFdeHojj7MXaIWNHONSg0cPntHkESZaInj4MYsOG TGvU99f+auqfkuYugMsGqDj2qOkZPTBoQdHXoCYBlp6ooIie/B3GgxPyPNnAciSS D7ulSEv5+XU+8ExCNZ5EolQhQOnvGELqoZFwEg0jNDKe/DgQ9SnwniE2ufD+lvQI 4xcYqBkLfnMOabWl7mnFB9K9ly3QN5A4L9mlJQnoFJzuXur3zeXTTXqqBdEGDRzG riVVrYNUuxuhWusqxKqSR6zXe1vU5q+mzA4LTOeWko8a/MtuSsfMBZT4iZU4R9jw 4jfOWzCcR92708Wf3FVmgBFzDFqMF9byiU8Jpv4tJK1UOkkDcoODDwJBidX7ahyZ yurrsXBVB9dY3L1U7JXXXVbiTEkmiufreeNd32o8WbV9SCqch5NcGvzALK3lqxi4 1JZI2L58ORHSMBk1Jm976yJG0p4gQ34i5aMvpzKM9awzFJfOxsHQ58l4tNiCiCxH Uh4f7WT24Isy/lnzLnNs/wt50ReziDbnFEBsF+NflZQUHL3Tu2/60Q/alBYBTuqv JWj4lDBEyMpbaEqBaNJFjp5vBqGOFEZdfwqusKcmPnIzgOo/0WR6xsXY01CWWYaF s4dxckwh5CBuuKcRQCob2y9fELlAHI3ns6bpOM4sHJUA0PqxN0dGID7dOpuEaSPy +0Tooe7/QV6otI+f Extension name: dq0q64i7 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E4F63D30C210790F

http://decryptor.top/E4F63D30C210790F

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe
    "C:\Users\Admin\AppData\Local\Temp\15ef2d6ef402a46165be39d9dbc0081cf28ebca0f407306dd80ac3a73a32c07b.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2728
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\dq0q64i7-readme.txt

    Filesize

    6KB

    MD5

    e698aa1afdc578250e3eb0d4b545812d

    SHA1

    d1d3816b5f9132abf8b7ae5fc01a492495fc3298

    SHA256

    6207dd1efe10a97f2c88e4694a3a4ca81d920fedf74f9f5cd403eb824ff4b217

    SHA512

    838cb0e233599f9c0585f7af5ee35738152df988ac67bec4aa506abec74f7edc8a6af626497f92dfc7b9e43707af7fea0ef21d084ca893d2278809f52d9c84a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58ce0252596d8085f10cf9aae46ee83c

    SHA1

    88317f9ec8ab90ca61f059d8d55d1c7856a69448

    SHA256

    2eb9dff322f77a78008e4932380ee4e780e5c81942f7a3f03f14196b66291923

    SHA512

    dd534cb5e18734fe00ed41275b3b737ce9eeaf2fd754c717f787cd0b9d89a6afae05267d829dc9f4e0fc7d2addeddfcbe879af86a10e83ed36969e626e2e181c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    62f877d3d878d4068af81aec4e773188

    SHA1

    5bd0d6b03aa3f07d8fe771153757eaed3c828aac

    SHA256

    1ae4a5d9f465ce84428817edd9c6162675888b8e599016aa129ec8f799878afc

    SHA512

    97ab87673c666a32860584dd67800b6819589c6102714d85fc5b9be829edd70081aa2f232ff83a79c234298eab42fe50de62ae51edfa9e978a8445ee9fb507a8

  • C:\Users\Admin\AppData\Local\Temp\Tar4B38.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a