Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 02:29

General

  • Target

    v2.exe

  • Size

    121KB

  • MD5

    944ed18066724dc6ca3fb3d72e4b9bdf

  • SHA1

    1a19c8793cd783a5bb89777f5bc09e580f97ce29

  • SHA256

    74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f

  • SHA512

    a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3

  • SSDEEP

    1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY

Malware Config

Extracted

Path

C:\Recovery\33b8i3-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 33b8i3. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/95D1174A25C5EEC9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/95D1174A25C5EEC9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: UI9SRqAwaQGSS+2hrvyi/Emrajl5Y/ThvTd/TkyC3HLm3zNNwC0lxWq3V7dnMtOM iBYfEMqV9cYYpN8GmW5BuQgFux2FFdvBTWJbrMz8Csj0Qb7NswGpA+iBlXaM39Fv b2TzF8xc5eUD1kzVivY/OjjyM6cT4CW6eMP1g7WS4WZEFmtkC8mCWdiTRGbBpYGv bYSsZnkG0THcxAh165H0uHaGCDj9ZSpIzcTd2FqhT5M11cr+Zr2VCSRkkwpD+8hz wHLeXVGtR4YYa0fhcY7ZrQLVX47dpaf5iLoctJa9h0G8BGLdetr/x0dtSKlxxWiM Vcah3GPpHCvfXm0/nnLgO8co3dIaSERPuh1TAq604ezrkvDU4g/vjsOeVsUogJDU MZVvsT0/YVOKMe2kD4GLi4mKPBkWy3BLg9kTiG90bxq28MdHdOmEWrhZeOwD90w1 OUKFcjrdR0RShlvJanp4Uwz9/hean3cWKvYYpR+ENwY2RuqywEE1hog7QEO2oKab Re/uc1npNcqcAlp5/yoERhCZjlSz24FI9fObXT8885RhQRXBKfMljMH4RYJb/CaY wuClpb8pQpHtzlugDFVNpX94JhCFG0gxYu9g8yegDBKTbDRB11QeHQQQLpdWsIf8 QHKJo/rQUueuYX8XqVxmGA8eDJC5MhG0Gvi7RrfZw6L8TyHaC/oA55yqYv+tCLW3 MIYyphrruT3Z33FXZJ0pHWa2WDVyIW5Dt4YF0ShTOeTxH1f/O3lLUeF04acIh6pR x8JebZM+QZG6Z04J1DDbUlfnWksbj5UaoImKVwY3wkawcwM8LrP3+VdV2ex6wd/F cFI/33dTlQGoa/Z4/C37TN8BXRVbB1TpWjOcZMQIvylzkPDKqYI7A0HgmUM04L15 DpO93B2LqRUKOLxCXIHdmNuCuUTCJCuvbyMurT4P4zwbbpbNxea+rFLcUPMkfS/H JRD3o5PzCKUHz+KLvy1xQ91XLX4ot1skasYUlsPHkON9EAi2Q255L1radoJel3hR cy5kjg/8cSoVrcTSPw/4pm24yJADajbJIKQdJafaRsQc83fF9oHy+dH38Xgyk7Ha OSQ6h+BSV+6kuteymDeAdLdoe3gTjEL6teS17d843rNDjaBa9Mvv0pPYKkag2iuq UBhzFrXyM8an/8cr+eddIHV2WH2p6HeqwwjAks75TtPt8KMK3QcDlZh3v8PleV5A U9iQ00KJAt9ATKfy9E9Eb1900/+D6yPuqhylmMfToSeFPxl7Ymhy0WfwrmmW687G SLOc1sC86760yukkbN1G4AqD490u4241uOMTAJnzJcs+/JoF/kLHOMquDMapVdOo R52fYCStEx+ksde1DVXbVZJASuakBSxG8d7QdA== ----------------------------------------------------------------------------------------- We will use the data gathered from your systems in future campaigns in 14 days !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/95D1174A25C5EEC9

http://decoder.re/95D1174A25C5EEC9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\v2.exe
    "C:\Users\Admin\AppData\Local\Temp\v2.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3656
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1728
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\33b8i3-readme.txt

      Filesize

      7KB

      MD5

      307728d3fd124fd69230ae7c75a66497

      SHA1

      6de19edd50cf8360e0de96689ccd41f62abc6640

      SHA256

      c82450d5f5b658a4138d8acc84fd54cb544c7f035ad2ea6cc63d53cee5a79624

      SHA512

      be777dfc05636c4c668c7795e6d6e4918e7f6e9ea8581fb4b5c3deb0568440c3a7e2f0704ca07d366f93007f55f786eeb6685ec30fb8ea04f7fcd83a1343f787