Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 00:30

General

  • Target

    54f07b825fd662618e1142ee47ef5c988c08ae59c60209bef250fc68bfd3826c.bin.exe

  • Size

    121KB

  • MD5

    cfff09d3936962f72fcee2a50e3fc2c4

  • SHA1

    92c64935bda4b9c4d5609b5f3a2555f2527f4c9f

  • SHA256

    54f07b825fd662618e1142ee47ef5c988c08ae59c60209bef250fc68bfd3826c

  • SHA512

    d4913f96bed96b5cb2f24e34a9597cffe948f9bf475b946605d6dfed2b11f0b1683145beecfbcdc487be1591a831b1255324e53dba50a3a04a962ff189512d98

  • SSDEEP

    1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZsc2gzuI51cLX:J1MZwlLk9Bm3uWcbHLc8PVg

Malware Config

Extracted

Path

C:\Recovery\4q4ns26r-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 4q4ns26r. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0D08A1158E1FF8A0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/0D08A1158E1FF8A0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: SEEc68aDwTQfg6J70AfKwJfh9Op1Yni3+Bzy+jzZL9gdo0OzOrYw3OfWBkGqxMp3 z1PjrP7aijjIwIsXxDiih7HGdyiYw5AEfRu4lYfZ2J7pwq7vON/3MPKRWL6fn8KE 693n/0VGwsq4+jzyZVeY/HoluOYkwPquMnVosnvnWJeSLojAe8o/4/DoG1kyvYj3 W3IvR0EXwo9M7hOgtn0Rbtv/J9ngsVlQbd+EbVW0WPFT94OgwoC8rymwVobfN+4h XiFryCuJWXUSsVNDT7goo76KRd2agxnk1Sp4V8KPeAY7O3NmqVFTu0I1Oz8+ivl8 GGR/b6zl0mcJwdWiy2K1YjAFSLiNi6sWclRvjzzuGM2PfyAxcU6weuVKTW8VS5OB hXGQxXMdQNUFNuJxuOQBYjMzRSer0Dk7RJLf5uUlZ/fwXRmaowEW+TMg+XlbGJS7 thqtZ7649Q3yxHY2ego3/d6ohnGrDSjwZz3PXeVKx4L0Kumj+S6L5SzWaOioNMDn vApFnfh81JquefTZmyygdyCmKvLoF+StZ+PeqZdpImBmQjq3jHhtf+LN/p6nRdoX Dzm5wE3096h1MMHdhSovdLwaK4L4YXidwAy6cDY+kZtAuTbnwcwwF0XT14PaxbMW 32jQd0TQdY29RVCn82yK8zD0tVn0YUhIQi9M35+pyutn8WquhLuLkL81duG4dNmR 9QcX8vGaKdQuhyjfBrm1NK3wYf7rl5L5w8l3xENXMERlA50px3utoh3Fwv4BR4bU 5nCYWPEEMc+vSfWaCW34QTz6JhiCnFV65B/4tyaSwCoh84aMu/+bZEeh1q7ZdcRV c2BiWP9qsCfq+vvwLk1m3c1hgYN5Pal4bPY25y0S3Lq6Ib9lq6KqJBeb3Xe077gs f4qlvwu7O7pzTNWEnV3m/GL9vp9aI+ULnDvsZH8UgfCBifumAQ8yq6J8NuKmSxEE qwwhwDn1MQxuE0kVcFLeEJ7t5fw7Q3PZxX9mMuivolVAMLYOCDYXb5zgktjTZPRd 1OFD609g2ae9KM1M5PmeOm3GpaGqS7X3ne7ghsCp1uSJoI+58VMI6yhkMgIgfvSZ 2yiZWVLrwwNGXD+1pox+wkWrAICZc8ZXd0VKeaketqD3dSFXM2f7Xj2qSof5z51i dkmc9/8x+SfPua8JmiazSuUpIcaDsQHykXrSArK4160CjZH9oGGKipqGHQfBq8vq 14SBZHpwk5BvgvrDyBcbgeqyQWFVAbuIltIjYfVI4jogIVZHXdwoUDEh3x5CZJhN i2pF10tTzC432vxmi1To5z7zuWbQrBaNYHC5wqaz+xl+eFUMXd2jMOq+yg/Ji0CZ A7OvFnxUQApCppRUt16pLlLZlOj184uk/Xs0RGNNR9E= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0D08A1158E1FF8A0

http://decoder.re/0D08A1158E1FF8A0

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54f07b825fd662618e1142ee47ef5c988c08ae59c60209bef250fc68bfd3826c.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\54f07b825fd662618e1142ee47ef5c988c08ae59c60209bef250fc68bfd3826c.bin.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3140
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3944
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\4q4ns26r-readme.txt

      Filesize

      6KB

      MD5

      7155b0a82704c1ec21eee435822a6d9c

      SHA1

      4c70c60e1a54c5c088ff1094495e351ff720f38c

      SHA256

      ed69e24865b61abe082d4fefe7b0b7ed70073a5ba91e629ec144640c9d1f3ac8

      SHA512

      c9d86f3ae2cd64d6ce3765b188fc934e89f397d2a707a7c6a0a44b8fcad536ae57b8195a5a3aada997dbe17bb473d39c7e4ed572bdf6f76b8bbfd9dd514371d6