Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 07:42

General

  • Target

    36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe

  • Size

    323KB

  • MD5

    6e2770b0d48c1aa2e840e4a53ff608be

  • SHA1

    6157fef4b433dcd4fe1763ef3db6496db4c0d6e5

  • SHA256

    36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4

  • SHA512

    18dcd40e8a3a93e7cd414d8f6778e4334eed9ba8f5bfe52505e5a7647568c0bc5c2ac75bd2a5e4e434bfd6d60bc1f47b532e0fc8ce038d914d6dbbdafc7a7278

  • SSDEEP

    6144:k8NJ26tkKqJQSXDG43m4GIdR0WpEKMJHDfP74PPupgMmHfhQ3UVmDjJr:k8/tG+SXDIIdR0lRpbkupLK63UVm

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

Campaign

7114

Decoy

withahmed.com

scenepublique.net

aglend.com.au

jyzdesign.com

nsec.se

cirugiauretra.es

gopackapp.com

tinyagency.com

crediacces.com

xn--rumung-bua.online

bowengroup.com.au

mastertechengineering.com

kmbshipping.co.uk

homng.net

fitnessingbyjessica.com

oldschoolfun.net

roygolden.com

sotsioloogia.ee

real-estate-experts.com

mir-na-iznanku.com

Attributes
  • net

    false

  • pid

    $2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

  • prc

    oracle

    klnagent

    mydesktopqos

    infopath

    BackupExtender

    powerpnt

    outlook

    BackupAgent

    Smc

    sql

    ccSvcHst

    BackupUpdater

    Rtvscan

    winword

    kavfsscs

    ocssd

    isqlplussvc

    visio

    ShadowProtectSvc

    tbirdconfig

    TSSchBkpService

    dbeng50

    ccSetMgr

    agntsvc

    Sage.NA.AT_AU.SysTray

    dbsnmp

    thebat

    onenote

    AmitiAvSrv

    wordpad

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7114

  • svc

    Telemetryserver

    "Sophos AutoUpdate Service"

    sophos

    Altaro.Agent.exe

    mysqld

    MSSQL$MSGPMR

    "SophosFIM"

    "Sophos Web Control Service"

    SQLWriter

    svcGenericHost

    AltiBack

    "SQLServer Analysis Services (MSSQLSERVER)"

    BackupExecAgentAccelerator

    "StorageCraft ImageReady"

    SQLTELEMETRY

    AzureADConnectAuthenticationAgent

    ntrtscan

    ds_notifier

    TeamViewer

    "StorageCraft Raw Agent"

    "StorageCraft Shadow Copy Provider"

    SQLTELEMETRY$SQLEXPRESS

    VeeamHvIntegrationSvc

    AltiCTProxy

    MsDtsServer130

    ViprePPLSvc

    McAfeeFramework

    MSSQL$QM

    "swi_service"

    "ThreadLocker"

Extracted

Path

C:\Users\a9f2d8a54u-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension a9f2d8a54u. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D9D50C834EE04FEA 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/D9D50C834EE04FEA Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: fJgT/31RMrfE5nHySBiqH9mynllzE0mB+rHzXFu7OH4OdpYqEj8D8D5P0TK4LXJD VGxnbaybfgHjmvjUBQ/OBtCbI+bcdDzmiOm6AQyxgTZ/AhDjPBZrCRDVVO+SxJNo j4WZkY+JFui4P5H/JhBMhI60CtFkGAFwiMLMkizdZQwe52Z6wk3oV3WtkKkhUZ8t uiBx3GS/9t0x0JYiwY0i1M37Si0ScZdkCPhFIXZKEPGQBR2XlHh9uoARFx+lDQw7 6ARlxVtAn1HYGxkWHAij/mx14jqlWI7DY1Txpra0pBt8A5QZ06s+suF5z2FljKuC k+cSLRsllB9dxqrXYpgZq+GIzJEqtqhts8HIYhAcUBNmy4TO5rXuXpFozBM7ruru HvmaLr804ssKST/jCAWRdWwd9uwOGUV5JMSGj3lwnadqpf6ejqLVr6+VytfdzdzO qbU19NW0KEoa2PxQqKraCWkQ8KBqETFZdDQ6TwmxWvvWZHCb8kKcZY7vdZ3cqvQ4 WGEBkuQ74l3jSC+fKsFyCpmvWHtD0H/rbSdV46I/9beiMx3391F6mUOU/1tMUaZu HMI61CiNQkVAVG/lKz55GftFgKbK24LFdM997ZEHUMrXJJceob1dLPVB8jWYXRdr jVOY07mugis2CNVT/GCikYstmfE1JNIBgvmJH1XlMmKUJwADXpRfU0h9wKqTQK4O mTMk+27ENLqW3LrPkffHr9EyGNKtzezHwcnEmqkfnE9RYn6KHe4B7BOV6cVj3vZ1 iWpFeYjiokkEeyrIqfrk5DPqlAB4J1sHRJdWdlrj/MrMDbg5WT021hrpXFxvmRPv e+zx/k/tQUg2ZF4wYMSu0TXr5xQdRCFNHflHhmkVLmzSG69f2ZxttrKkesud1iCG olodOyYtVMRWIIwKEAZqBgmLcip4HDZgMl16N1doW+VMzLBU2t4D9dQNTUyQDqbY ME5/LOIwJdrjKrK8jQMEiilOkM9pK91YeD9XUBCszmIO1VWuTInJW3j/tiOCUO5P lPWdy4V1aKNV0K5Rf7QQulpz0UK7WOHkOI0ZfhdW5Bst4R7EcZFDZSSvOPGxE0AB fdUQR0lil2JziT1NV80KChLj6wC1TI1VP6DEaNj14oBr5tvLm0YMGk9hphOdqwQE ghuJbXcgKz4JBhCslCQzN92yXTx/uxKwWTiLfLAuqcCr/w4hKFKU6JSJmuL56XNO S/MLB5kUhS/52rsOBrDfdnmL/4fjuBiE7h7Pj//D2SK/sUV6KcsBGaZ5YopfzBPu lEZuhry66qrIxV6jrdddSbXb+/FSilbyiJKEGxyCmy7tW0yPQB43QaGGOFtJX1Y/ VQ/hIkRj2kUkYVzf43eNidwNag46NROXI1eVxnOC ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D9D50C834EE04FEA

http://decoder.re/D9D50C834EE04FEA

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe
    "C:\Users\Admin\AppData\Local\Temp\36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:908
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2672
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2856
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\a9f2d8a54u-readme.txt

      Filesize

      7KB

      MD5

      da4801953024275931ee548dd0ace11f

      SHA1

      d9d1fb461cb1ebc62c99763d906242a5cfdfe099

      SHA256

      a611690d508b40036334e00a01cae5c0210a969abf6421fa4276a967e6d4dde8

      SHA512

      80932372f062dff77bfb460be516b8fc5739bd73969aea16fb9b086b45fc2da441c3dd969bd53d45b33089ee5dd841fc2c66a4641b3511b5e798edde68369b36

    • memory/908-5-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/908-3-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-1-0x0000000000290000-0x00000000002CC000-memory.dmp

      Filesize

      240KB

    • memory/908-162-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-8-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-7-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-6-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-0-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-439-0x0000000000290000-0x00000000002CC000-memory.dmp

      Filesize

      240KB

    • memory/908-2-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-4-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/908-421-0x0000000000290000-0x00000000002CC000-memory.dmp

      Filesize

      240KB

    • memory/908-422-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-423-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/908-424-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-438-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/908-440-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/908-9-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB