Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 01:35

General

  • Target

    fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe

  • Size

    338KB

  • MD5

    d44186f7b95ba487fc1c54a05d68f04f

  • SHA1

    f259705190dc78c7575544f22dbaad9066cd3f6b

  • SHA256

    fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278

  • SHA512

    5a14e02a8cf384e73ca115bf7ada61625c06453a9123d71a55f9f25fda21d3551160b21b2f1a47888ae2e54731e65315c46025dd99b717ac16e3e1fab89a4ee9

  • SSDEEP

    6144:xuqAdxB6/8KdzaacY9VpmvcP0GdDlTj2pxRdCgNKTE:xIe8KNrcouc8ujwogNKTE

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$C7h8RDw.z6fjHkEKce6Gde74pzmrAUjJx450POTKe2M3TmsCFxG86

Campaign

4619

Decoy

newyou.at

manifestinglab.com

lichencafe.com

sportverein-tambach.de

dr-tremel-rednitzhembach.de

wychowanieprzedszkolne.pl

sotsioloogia.ee

zweerscreatives.nl

amerikansktgodis.se

div-vertriebsforschung.de

webhostingsrbija.rs

kaotikkustomz.com

surespark.org.uk

cwsitservices.co.uk

stefanpasch.me

lascuola.nl

oemands.dk

pasivect.co.uk

connectedace.com

international-sound-awards.com

Attributes
  • net

    false

  • pid

    $2a$10$C7h8RDw.z6fjHkEKce6Gde74pzmrAUjJx450POTKe2M3TmsCFxG86

  • prc

    benetns

    sqbcoreservice

    pvlsvr

    ocomm

    agntsvc

    tbirdconfig

    dbsnmp

    outlook

    ocautoupds

    VeeamTransportSvc

    infopath

    onenote

    steam

    ocssd

    bedbh

    VeeamDeploymentSvc

    synctime

    wordpad

    mspub

    isqlplussvc

    xfssvccon

    visio

    thunderbird

    oracle

    CagService

    dbeng50

    bengien

    mydesktopqos

    DellSystemDetect

    encsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4619

  • svc

    MSSQL$

    BackupExecJobEngine

    CASAD2DWebSvc

    veeam

    bedbg

    sql

    BackupExecRPCService

    vss

    BackupExecVSSProvider

    PDVFSService

    memtas

    VSNAPVSS

    MSSQL

    AcrSch2Svc

    AcronisAgent

    MSExchange$

    VeeamNFSSvc

    VeeamDeploymentService

    ARSM

    MSExchange

    VeeamTransportSvc

    sophos

    WSBExchange

    svc$

    MVarmor64

    BackupExecAgentAccelerator

    mepocs

    BackupExecDiveciMediaService

    stc_raw_agent

    BackupExecAgentBrowser

Extracted

Path

C:\Users\umo6tpg08-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension umo6tpg08. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/02C26672A1326CA7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/02C26672A1326CA7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: zh60M8cuKQRf0NfGuTz5KbXKCmROdjV3ztsFnbYpovJlzd5CvJ9EyH7pv4y5y6rY 4hyJTVOHC1TZeJMpRUQYhziFkhUtWTZTmCx0ROMMnQ1bSk3QsewezruLp1G5unfG t38K42R2wXovd5mCKO+qKpRYh2K6WL64oB5YK5gLNNmdIT48InUQFNqZoztlTkWB c1tUW6ILL8ey9IOyNmmaMq4cEsEYtVhJ482IsJmnbFB30KD6siDLyuW6E6T5pgpc d7WXcOLXsYSaZZmaADU7bycC8HaNi0SdBGGsqFJ0n03LEZHn1Gpm2uUqpPwZhbCi SYnW6ss41qVy6Ivg2I5HnKVryZfOKr4007DTJpftemm4yf/U4zIuVW8BZU7mMb7j BoxCDKe1SaJe6xIWoInh4AvgpbQ0ap9SQ/lREAEXO+JLjBZlJQa3DGjhgcLaVsQ+ Nsb4B+WpvltmKYVyrx3YEsQiZU7ayyBSKgMsNuqBFKvGbEdGNboJGNNy9RWrkqNU nHKYL6GcZPyTkv6jJfaW4XZenKK8xpLxBJ+BfBkWpXZaerkLrMn+a/4bow0C7+BH zMWTqwDkSXRblmFqQ7IyugJUXz3QYAc+zlqQsGhCGsIaa3e7p5lg9EPElktChymr E9eOD/R2T9ytkm0ozjqlwN619PJ7kb8wedx1ODDFxU7rL6QQlOee/3+YNA+UYETq xZjDaujyDEEI3SS2A46raLlQJiXq155gtaOWol76vdtXv6UqoyFO4S1c7saLFUmw 18pLZFsiZyMth4ZME2oNTyu/5nwPzepckxoYCZUfLgM+Jn5KbLqy2OGZmZ8SU2Vw IuDw1TSALwV2jeBpeMNVZLW4ZKtKIKYzKqb+g9OFAVOq3RS4dtAAkgzMRzyjTOak Mai2sAMDXNyshKzrSsrQE6PJrarCZ6tobcNCsslCVX67HJvSCC9c9AzCYk0vyDic VJCtuSz+BpLGAKQSs0VqVvbcOOEnFjcSZCDwFPcNVHb/wO7PGtDvnHHKthytyUVP wyZUJ0QDkm7imxEC13WW8Y5vCcjmdYG6HfIt3470v/Z1F5kQEhDrYsye08ai68yo HzQ5YUuOvMO4Ct0JQZld/+5B85AMc8JjMJYdMhP5SPiVporNfXHtybwneF5WJpjk Ika5xeDunnK2TbTBMVDeHO+UIrvvLNaHH3tLh50se4x6wmRV6GAJXH2OARag3zxm /c/58fg3uXcGv3OlEWDx8dgF4Lr/kTdpDXpnXx4YZDXIXAmnDunz2PoNB5YS/V+L Gh399d5dENs/0qDRGQz4HJ0Crfq+JSgmV7tfQZyYbbK6E6PQqKjknv9XDfN8iXNz B/enphR1red1BddZHH3jGGYGx4OfwBDowLDwlpepjcpFVyqfHw4= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/02C26672A1326CA7

http://decryptor.cc/02C26672A1326CA7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2360
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\umo6tpg08-readme.txt

      Filesize

      6KB

      MD5

      a59586880f60be884ccd3e8e0a5d9cfd

      SHA1

      4c865740676663674b4b433a9dfdb61bb5f7ab0e

      SHA256

      5b35924ef701b732acba17e46291c9604c95492c55a28d36668ba3cd0d4e798e

      SHA512

      a256c5ffc4dbf46f7d105d593fa1e3a834f27d239ebb64d07c2ed8d25aeb1eb7642d3c612083e7fabf9af23b2af3bb609c37f1f0d2fbb979a4f956e5aa0ac85a

    • memory/2156-3-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2156-2-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2156-460-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2156-1-0x0000000000650000-0x0000000000750000-memory.dmp

      Filesize

      1024KB

    • memory/2156-461-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2156-456-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2156-91-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/2156-90-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2156-89-0x0000000000650000-0x0000000000750000-memory.dmp

      Filesize

      1024KB

    • memory/2224-9-0x000000001B530000-0x000000001B812000-memory.dmp

      Filesize

      2.9MB

    • memory/2224-16-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-15-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-14-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-13-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-12-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-11-0x000007FEF5600000-0x000007FEF5F9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2224-10-0x00000000027A0000-0x00000000027A8000-memory.dmp

      Filesize

      32KB

    • memory/2224-8-0x000007FEF58BE000-0x000007FEF58BF000-memory.dmp

      Filesize

      4KB