Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 07:42

General

  • Target

    36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe

  • Size

    323KB

  • MD5

    6e2770b0d48c1aa2e840e4a53ff608be

  • SHA1

    6157fef4b433dcd4fe1763ef3db6496db4c0d6e5

  • SHA256

    36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4

  • SHA512

    18dcd40e8a3a93e7cd414d8f6778e4334eed9ba8f5bfe52505e5a7647568c0bc5c2ac75bd2a5e4e434bfd6d60bc1f47b532e0fc8ce038d914d6dbbdafc7a7278

  • SSDEEP

    6144:k8NJ26tkKqJQSXDG43m4GIdR0WpEKMJHDfP74PPupgMmHfhQ3UVmDjJr:k8/tG+SXDIIdR0lRpbkupLK63UVm

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

Campaign

7114

Decoy

withahmed.com

scenepublique.net

aglend.com.au

jyzdesign.com

nsec.se

cirugiauretra.es

gopackapp.com

tinyagency.com

crediacces.com

xn--rumung-bua.online

bowengroup.com.au

mastertechengineering.com

kmbshipping.co.uk

homng.net

fitnessingbyjessica.com

oldschoolfun.net

roygolden.com

sotsioloogia.ee

real-estate-experts.com

mir-na-iznanku.com

Attributes
  • net

    false

  • pid

    $2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

  • prc

    oracle

    klnagent

    mydesktopqos

    infopath

    BackupExtender

    powerpnt

    outlook

    BackupAgent

    Smc

    sql

    ccSvcHst

    BackupUpdater

    Rtvscan

    winword

    kavfsscs

    ocssd

    isqlplussvc

    visio

    ShadowProtectSvc

    tbirdconfig

    TSSchBkpService

    dbeng50

    ccSetMgr

    agntsvc

    Sage.NA.AT_AU.SysTray

    dbsnmp

    thebat

    onenote

    AmitiAvSrv

    wordpad

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7114

  • svc

    Telemetryserver

    "Sophos AutoUpdate Service"

    sophos

    Altaro.Agent.exe

    mysqld

    MSSQL$MSGPMR

    "SophosFIM"

    "Sophos Web Control Service"

    SQLWriter

    svcGenericHost

    AltiBack

    "SQLServer Analysis Services (MSSQLSERVER)"

    BackupExecAgentAccelerator

    "StorageCraft ImageReady"

    SQLTELEMETRY

    AzureADConnectAuthenticationAgent

    ntrtscan

    ds_notifier

    TeamViewer

    "StorageCraft Raw Agent"

    "StorageCraft Shadow Copy Provider"

    SQLTELEMETRY$SQLEXPRESS

    VeeamHvIntegrationSvc

    AltiCTProxy

    MsDtsServer130

    ViprePPLSvc

    McAfeeFramework

    MSSQL$QM

    "swi_service"

    "ThreadLocker"

Extracted

Path

C:\Users\6o101697-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 6o101697. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6B0CFA941CE3468B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/6B0CFA941CE3468B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Fph+TDhYsuR85jkI2L+CGm4EHsECioYy3hfhCAYwGyN2ajyqhMZfHwsYSY3GLbB/ j0LSXSt2y8T3aUT1T0q4f1CuOgidcUaUQgdNdDVRTmHVhcgU5MCYUXLayw3hjCGq OeUsD8kPF78qJ5jQkX6utK5vfVuy4P8DwNrcLhjLIBGNyomf/iTJMlbmAEJtPQA4 ZKPtD7ME8HrHxzVWVv6MdVhEGiBYB1v/ysrv5SY5tVofyFKE/fMaqGcKLowTr1PJ Z1roRcGf9s+dYp32MloO3BrsmAE1C2rnuW7y2B0HBddQSukQWAlFamMNZkQayEIc TbSC80Ioaz3pVt4W3h86JbApZvmXZWw1S2vsXId6VFI0AES8YnQffCYR65gSLKCf r5k3dA9FGeoIh4M2VOsIVcXq1sas23i4YN3EtoSFNcngvyV4XjnlyFHOtuziIQzx f9iTm0VdFZwZsZKUo8U4WGkvIdoGBvjTU4vHj/a+F1dOR+auyTFWoA2qFlVjxtJ0 XOdcSmP+DcbDcFTREq9MCQql6KOQgHmTZir+bpsTKE6jJZ+4jz7vMbiLz2gmwgQj /8bG0jVOIqPxmqnSFuL5bJCDuKN+UZZGiCNiaIHaYa+gxFbH+UtNVRwYm1GeSdWm zWWHg8121MevRZHjb5iWEvKyVqqDtYT0gHTJdVFhpYfSDJcpbgOsjhRS8kFFO3Mo fpP5fq4NRi2hFBUgQ6c9SXyN6FUJ9LWZR1E+4cYeZr5q4fc+LaM93kzFGF5LAdXK Y74CN0DfKjXlt7kBGbpwn4cRYUdeoCwgIm/NMQKlxc6GVxfkGaOzPCBY9f0yJgRk SpXGXWPJvLv6BDFCT62cbNzgimly5zQKQYSUZfCMwcAoNmqy9WsSVyOcuOj1Unia w2tFvKvK//iAhrk9lMYdSo6YnP8vvYRMlMTZN9WeIESePgazREDEoZZjMHe2tHsU lc37mxihnCe+jNAwiP8sxFsgz2trofDwfyz8FTwHqJN9rTbW7r4uzTfIJkYSQ42A 8K6RzOB9z7LpvhbFAxylSKbXpHsm2Iu2IkC2MmUNt06+nnUqilNhu0rxkRukVxh3 rZIZuV4+P3NV6MSjAzpHJBAuM1WlRfU2GN2bz1ugNvueLSjZM5hNUPMrJgvlAEQO vIyjRKUhiX25x5eC3tdCqX0yl/At2utw+6xILAk/wukRFdHytC7XPmSdWo144A8R WtGHgOz+sYL6LXURHkUVgphvrzbiv/9ckqigMuLgw2jsUPGsQeA30Il9aIxrw8Xo /q/Zt4cuMKuqM0a6iNeFNGdSjhDlXj2YFQCr4eZfxNK2TM8nvJuuly2cIFDHR+bh JEzXByOyHeAh/B9QdZFw5fR9Iysx81pcKDjz9xSqy3I= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6B0CFA941CE3468B

http://decoder.re/6B0CFA941CE3468B

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe
    "C:\Users\Admin\AppData\Local\Temp\36ee6c2c60a8b2027b12b173ed0f7af4e3bc36fee76147bab3dd9f8d7d0057d4.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3836
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:952
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\6o101697-readme.txt

      Filesize

      7KB

      MD5

      a8e0baa66090ad00fd0f6d7207ccc6c2

      SHA1

      985cf16316c3be8a3191375f567629b516d0c477

      SHA256

      8c3854917e0b6416112ebc8e7432ad325e8f4ecc824719a3207a3b10069ec983

      SHA512

      65e77f33ee9fca1773a28f93ac909c317318fbc00a9657e0ca71cc12f8ebb8537b98fa3c2a4dc5c795cc0df6e2c348bec79a5f64492dafeac8d51a96a17ca564

    • memory/3836-8-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-6-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-5-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/3836-7-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-3-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/3836-1-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-2-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-0-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-4-0x00000000005D0000-0x000000000060C000-memory.dmp

      Filesize

      240KB

    • memory/3836-381-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-384-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-385-0x00000000005D0000-0x000000000060C000-memory.dmp

      Filesize

      240KB

    • memory/3836-386-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/3836-392-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/3836-394-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/3836-393-0x00000000005D0000-0x000000000060C000-memory.dmp

      Filesize

      240KB