Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 01:42

General

  • Target

    LisectAVT_2403002C_115.exe

  • Size

    152KB

  • MD5

    3d17a6951aa9901375b5e9554b76c1d0

  • SHA1

    df1af8b22004c0668f2d0dde3d05ad6d5da3b0b2

  • SHA256

    9a93ebdf53267d5d064df0fbfa5951a2ea2d503fd89e837e8600ecab8d7950ec

  • SHA512

    98e5fad58c49bed4fc4c505d4f48d9fd33ae9b620ae3be28e5d0da7944c64e5f2b8da17e1154f08b9d9083fd39aa27350b63ce93a8213d8a9b2be9089075ddac

  • SSDEEP

    3072:ctchTojrZxtMhiiZHjUyWr4X5FTDUfGCH:c8kjztGiiBfW8X7DUO

Malware Config

Extracted

Path

C:\Users\3z5ee8-readme.txt

Ransom Note
---=== Welcome. Again. ===--- [-] Whats HapPen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 3z5ee8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F0B7BF376A54B0BF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/F0B7BF376A54B0BF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: yRpvPBVTrtr6xez97m+eEgBbwXnBip8FdtgFnauRrRLebrl2NuvVg2uNMbE4n1e7 FiSG6dJ2wD392+vm9Q1DYKwPYcZfb9Y+OhjUiSG/RLUO2BogtJyvxXGmnMxM2Fnv 6tMKFEeqNzvsFg/bath/3DYHSBvlwpL5+dWKFB7rngI0TswO3ouVo2VORGkv2nTm PttI9Ydht1zy0oyByEO4WNnGDT+b6T7t2vQTrRvBIKiiw5DctbGNEoDz56qeXhtk 7334dKHh0bVAvoBEMJUM/SKyuwUTd9NMcF30ZxGOKWMpUxFzPYB+8+HbKskZZ0H5 uqCb71WR4M4lGbAFEXTbkeaGVhhMMqLc33dTv/u5TiBeC+7BHoiiMTHmZ/mKe004 lvYz3YhjXtxZpinnquu0x7V+e1WnmbhvMur4lFTH0rtpZVTvYeNN/4Ajj7oaCX3m X0UO8izJyidg9J7qs38LrzwCz83RDKXYZNzJHitIPSXiZkdmcEo4Ip/ugz0nnLFW V7YpcyV7TfIX1gVXoxtMOIcaXY1VjVUsP7wemcF84fAdQcp0j3uErbnOw91KY7P1 LZl+p6OY2NRkAvg9NVcmBfnYSAswsEQ2UZhQ6+1G3BUmtezzBx3HBHowMwzNv3HQ bO5M+phSrTMrdQvNvbPKn0VUlRTJvXirFIjW0zuH07f8oNH+soJPGar5pBDgUrtl oAMELKVKAF0LZWGsNl+SZ1SP+dmJO204siJOSaIfUxgm/zUsPfQ8D6r85G88WnIc iCa5TiKvPGwemOJQd2qX0BFTIyY0zDkjyFuEkNpw0NXBxd/xFh/Dmg2AZb+l5SNm k1X5U1Eq9hPjtQumFAL12TBXZ+k4gcguH5q0sDP82IG99KutTiTYd/UkeJuEyDjF iAOVTsrWVixNhUHnDkPsGRma2e2IpxtyaJd+5Vl03fDurFHfV7CtPcqjEquZwCln EnQr5iGQk+4lPong/gBLZ0z6hyZk47FBtsIVy5BCBuuIjCDIaluDDFvDgpCaQ4Tx /L5WIDMA51GlYV6EEQpVet+4Ke3hZ013hnve+sfCX/JplLWd0gTrbp7YcAImkZZ2 T9vejT67hxs3uueFDF2jI3BsmMxKieilvgnsGNIvU18GzCZSeXU/Q3CTuroMFCYo 2wiGvmijCbruxfkDIxcC6cdlUrFlQiNyrr7vNG5UpeCktoCbOHyJHW3bRiJDAIdd GhxhXily4YMX5YDLQatuCe4/GFLkvJCojjQIbILA1GWHl7Lr+OBT6M4pzdoj1n/+ p8+6nzqwYzKMJr19/2XR+EQ8XZvxsujXZRpXyaCueViQZQgL9Nf5a464SiveZD6T blH31WSSmlGQwida/yDsrWU5Q+JWCA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F0B7BF376A54B0BF

http://decoder.re/F0B7BF376A54B0BF

Extracted

Family

sodinokibi

Botnet

$2a$12$prOX/4eKl8zrpGSC5lnHPecevs5NOckOUW5r3s4JJYDnZZSghvBkq

Campaign

8254

Decoy

boisehosting.net

fotoideaymedia.es

dubnew.com

stallbyggen.se

koken-voor-baby.nl

juneauopioidworkgroup.org

vancouver-print.ca

zewatchers.com

bouquet-de-roses.com

seevilla-dr-sturm.at

olejack.ru

i-trust.dk

wasmachtmeinfonds.at

appsformacpc.com

friendsandbrgrs.com

thenewrejuveme.com

xn--singlebrsen-vergleich-nec.com

sabel-bf.com

seminoc.com

ceres.org.au

Attributes
  • net

    false

  • pid

    $2a$12$prOX/4eKl8zrpGSC5lnHPecevs5NOckOUW5r3s4JJYDnZZSghvBkq

  • prc

    encsvc

    powerpnt

    ocssd

    steam

    isqlplussvc

    outlook

    sql

    ocomm

    agntsvc

    mspub

    onenote

    winword

    thebat

    excel

    mydesktopqos

    ocautoupds

    thunderbird

    synctime

    infopath

    mydesktopservice

    firefox

    oracle

    sqbcoreservice

    dbeng50

    tbirdconfig

    msaccess

    visio

    dbsnmp

    wordpad

    xfssvccon

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [-] Whats HapPen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    8254

  • svc

    veeam

    memtas

    sql

    backup

    vss

    sophos

    svc$

    mepocs

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_115.exe
    "C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_115.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Users\Admin\AppData\Local\Temp\DFoPDh.exe
      C:\Users\Admin\AppData\Local\Temp\DFoPDh.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\25e15961.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2652
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2564
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\3z5ee8-readme.txt

      Filesize

      6KB

      MD5

      792b66b7d25aec29d54c9a47c65bbd3c

      SHA1

      309b4d0d1bb2a93c4a592e7bda5596fa7023a0f6

      SHA256

      d81834ca48e7ebf0d8b07e4ce88ab63bfabb716beaf2f27b78f12b7d3e7759e7

      SHA512

      cbce0b2394c8278ceb3f665546165042e58a11cadae0bdd106747cc394c7bda5f00acb3961b3b5b37441319a2b8127af9f18acf88bc2ae308aee8dee6e61841e

    • C:\Users\Admin\AppData\Local\Temp\25e15961.bat

      Filesize

      187B

      MD5

      e813441586b3ea8a3987219ce895c401

      SHA1

      0508f33fc3853059d1c9956ea026e4c62d460f4a

      SHA256

      a61efc2e6571d1b08e5dfea972e18f4f03e2ee077a80528597efaf20e0477dcc

      SHA512

      e7dd50af7535ad3478850e97c288408207e1ec9956153148ca5ed5278b3483801961bb945fe9ab247cbb03a2b23f1caebdf119fe4befdd15b54e016553887f69

    • C:\Users\Admin\AppData\Local\Temp\DFoPDh.exe

      Filesize

      15KB

      MD5

      f7d21de5c4e81341eccd280c11ddcc9a

      SHA1

      d4e9ef10d7685d491583c6fa93ae5d9105d815bd

      SHA256

      4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

      SHA512

      e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

    • memory/588-11-0x00000000000E0000-0x00000000000E9000-memory.dmp

      Filesize

      36KB

    • memory/588-4-0x00000000000E0000-0x00000000000E9000-memory.dmp

      Filesize

      36KB

    • memory/588-0-0x0000000002C30000-0x0000000002C57000-memory.dmp

      Filesize

      156KB

    • memory/588-528-0x0000000002C30000-0x0000000002C57000-memory.dmp

      Filesize

      156KB

    • memory/1888-29-0x0000000000330000-0x0000000000339000-memory.dmp

      Filesize

      36KB

    • memory/1888-12-0x0000000000330000-0x0000000000339000-memory.dmp

      Filesize

      36KB