Analysis

  • max time kernel
    360s
  • max time network
    368s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:08

General

  • Target

    3.exe

  • Size

    157KB

  • MD5

    4bd82da426f6b59e08b40044adb5a3d2

  • SHA1

    097db21cb36c15979730a775ac6bad1240d75275

  • SHA256

    add230a2e7aabf2ea909f641894d9febc6673cf23623a00ce3f47bc73ec9b310

  • SHA512

    77dc3f9089bb1877defa28e39a9c3a615efed7975dbbe3a4d3af942a450776cf2935d164059d2519aa2d5105ab06106c39431e4baba82c42c3f2cbacfb82b630

  • SSDEEP

    3072:wi8Iy8EytSLbi4eTMlwDCnuZ3j9ifgwbDJ1fMP:B8IUykbnWJZ3jkflJ1fM

Malware Config

Extracted

Path

C:\Users\Default\8t6q86h02-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 8t6q86h02. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C57A79E417A53084 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/C57A79E417A53084 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: EeXrnl15ZYgHtfRKzKSrTNR6VbA/7ellbHnnZT2CGe7GItfUIfoLUWfBWvThS9UE yq5red3G+V34UIRxx4UrX+L9ffAL3+Q2IKsKSEJNFTAAYn/weNkneI4qdV/BdErv ZN2JTUzwJHJSk+sevN1pUh+s/zt5d4CsV8dx+voqganiCRor2ID4Zn1nAS8oXuF7 nRSUam1SAWchW7Gp2hnVyqU+xZGZ+mmxI1tzgxpJ2jzx9aPoSUxOXzYSKw4wfC1B JSw9a28MVxPusGGSY9GUj5ecM9KT76Bxwo10FU28+KBGAzbtWBjkzpN/h6/tYT8g aBhFkFQ7apGMc9cw+e+zkft9hrvCtH4ld4cnQ2BtfhI/7lfbJMYI0Q6jtqBNq7/F Zhmm2hPfe7VhR5mfLd6h/uoLRkLk0oVk/cPdSpXp/HiLt852R9EY4icf1oZJbNKI nwrYGrZlIS14mUMlQrSmWX18ItJ17yx+zxxg+HyT4qESabE2EPkyR0hmlSPTU7yH s719jMbplntuVzjfXHy9zLn7D18AXM592v109tv556uwmq0U2rtShxZdcq7vq/AT QdRkKIf3FWiJt7ZcDYBr1kf3prVzozuGiMI0h3sCpnThKxzQ7GucGLTOYPDLtADV FSRXvRPfMiJnyZR0JEAPDzyKWXF5Ro8I+rnW3IBh8DKAUInYs/ofn3YHs6PZ8+yM iE2+rYQNlfhlP5qJ1BvpdT96ZwkOjFvz+xJecn+42x6oHmCYt7bdIILxdBJ3soU9 IBD0UjuYUz1TBAlpDdRaO1HlnsearnAiDdC/qfChDhhAMCL3+K3yl6sChncWTuut joAIM5eJL/cY/JxUIOeBIxmOwPl2yU/D3cBLUSSnKF6fF3chUKKobO3Ws7emZaP+ ImOr9eJA/E1Tp1HRaWEY7ONI6wSpxAhUkF6494Zl047ljy0qxdY7TlDeLljueU5W hzlPfy6uKX7XOjRqL81T+FcZIVhyMExD7yFiyqS77GXgIb6ucFAp+M0afrk8tnM1 FMXBjW4f5J8QpY5hZ2oL7muv0HjGajoWwCf2E1Tv16krKqi45KRSyzYHFJ6B2l3Z xayUFRMa55JFDeiexT2VmgO0ADCKi1bh2hDCFPDN1x9NgzNWWbnQ0tYBw63FZ4IH z+pFzwNO38us5Ku0D3TlIaUclz5BxuuQCFk= Extension name: 8t6q86h02 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C57A79E417A53084

http://decryptor.top/C57A79E417A53084

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.exe
    "C:\Users\Admin\AppData\Local\Temp\3.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Interacts with shadow copies
        PID:2692
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Default\8t6q86h02-readme.txt

    Filesize

    6KB

    MD5

    9b3e5a8dfccd639cacb536387fe49eba

    SHA1

    3845448b5254a56a21cc37c80ece413353fb8dca

    SHA256

    853b1729af6e731a041dade8b34c38cce734182616f3205081c261c9719f275c

    SHA512

    1ff2383135b228464ae929098b5ed9ff4cb18fdb51e3fe09c7bc3adafcd4d434cfd812985dfba3352d31c1792b5ca65cd3721b9e390c1f2f2f032ba5fc306b8a