Resubmissions

03/02/2025, 21:57

250203-1t5hmsvmat 10

03/02/2025, 04:37

250203-e896saslgn 10

31/01/2025, 18:35

250131-w8gmxatmc1 10

Analysis

  • max time kernel
    726s
  • max time network
    535s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/02/2025, 04:37

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    164KB

  • MD5

    2756f86ef462729bd072ef2d05f00f54

  • SHA1

    b074e97c19bc69d39c235c763675b492e2e216f1

  • SHA256

    38beb0ea97e3c5758b4839b8874d552a6ddce7bcde77986c62bf49041e229bc6

  • SHA512

    9c6a618870ebb1a50bd647f26327d4ab25905c8d438e1f71be87f343e91d58c0e4683afeefc7f725b091cb1a47b5e7fa30d99402fb4296a88e8a5b138ef62d14

  • SSDEEP

    3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFf9eRIL8nmm:veoUeZR2TRCWQFf9eR

Malware Config

Extracted

Path

C:\Users\4k2gl-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 4k2gl. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C1CBC3907A0B6DF8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/C1CBC3907A0B6DF8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: sb/sVvH+PGcfDsMmgxMcFfzSQUeSFk/6WlcCE86JcCEYXMSPxOfPD6MiLqts3fQw UORbc2vftDvr2k4aB6yVkKQNCWeugXJM/yKSW8lJfGPjB102/SoYHymBfgvrdf0m KNM2U2dXBzoipMdYZIFLw8dOby1tsjbw/o5eZF0+32kvyzjxh22SL2pwHe4aYO5D LlWuV8ZtWuiVURTZn8ks81dtP8wBFWAceRrIwXc19MhXaWIBInKQFcbs/doNaMQD cJQyi3zKzHqtdcAIOpTZnxTbLoXLLsb/UN+7GP8QpO37LLyDEzwhhCyKnIJqiAdW Xy7l3MntNl0mT0+loarOPIdun5z1ReYbmo4DgbZ6zU1xWME2QFmHB+Px09E7bQJB 0riv5WeqHbW9rWkns/rYw3IziocbqURNC7RxFR6f5/aCBMNtfygYkJXd50OVGfg1 rW0ty6uVY6IbU/1oSnczSPRmDNVmVyczsElnH4ceBqhgf7I8g2D0uKpmfUKEoFUu SXLSdAyN3N29Ubdz2wrVeqLi8jthvSg4K4Pbp6ckQO39/He39tEaVqVW/vgwTu7P l3TRRqiDW/8ZukBmf6tnbPQw6YVCYLfO5DfszAvTWutBxhhlatk6mNlS4mkIlN9p Vp3JtWSw98s71wJweFfHYy/3odV74vogOsQFCnts8Ft909aPXqVRGlXbd9ahm0nK q/a4YN0qI+d2knpjq/wJ/DkBNVQE4RTOmaF/zP12xDJVQ817SUueQ3ikfSnMfVu2 PulAE5RbLZbMhdOi/qdYkifHTnm1puJHsWbXAZYU5gE02jTqFuTky0bPKd9x9rba toqrwepGcIvC9lYR4GslLS4mOxQPJZ2sdUf7icL0+iDkTxk1s+JVmV4mZakkPgT9 DwCjgAOZ2IVLt1BRYtZ29Hpmw4fkg/EgIW6+tSrW8eGilDdj9kY46LI7PNNiR0Zw 8tMViq+YjpwmXHpD+J15ARc2P9S1GuDk9jcdrPMribPo+mXRsqdxCDj+FjulhGfq sUQZ2JuNGx0nMpusn6IpMdPylhQodHwkbdWSzWZGCW1dYjACK3To11HuXi2Vvluz 8jk1+O4xJnuFpRxqW8Gao+3M3j1SqIzfN2tccZXe6hRCo19tI/4WHN6L0kq6kFUo fG3tb4juXxkKpos1mM18vJ1b7CQwoRtgM5kge9wCv0AsrunJAQ7XUCPTeUipLps8 myOhcuCsrROWOthx5GJ/JCgCd1fpEYqsfQFW8N8dA8iqYtyc Extension name: 4k2gl ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C1CBC3907A0B6DF8

http://decryptor.top/C1CBC3907A0B6DF8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:396
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\4k2gl-readme.txt

      Filesize

      6KB

      MD5

      04c99be80c899c8ea8d7d0c5d2f1c0be

      SHA1

      3ac03766d386297ae949f2bc8f0615a8081d1607

      SHA256

      d2a8f1851224d96a02257a408e2e8c11acfbaaff9c7acd6e360ef2e7a228867e

      SHA512

      31f1c3fc7986479046b8ce57fc71407a1943e476df42fcf1e90ff27e4656341a567c1563d6f8f02ce2eeae2c26b4c6830cb178660ff5c93c2b8b4c48088019b3

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lepkzw3u.uis.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2556-0-0x00007FFB9C503000-0x00007FFB9C505000-memory.dmp

      Filesize

      8KB

    • memory/2556-6-0x000001FA6FF60000-0x000001FA6FF82000-memory.dmp

      Filesize

      136KB

    • memory/2556-11-0x00007FFB9C500000-0x00007FFB9CFC2000-memory.dmp

      Filesize

      10.8MB

    • memory/2556-12-0x00007FFB9C500000-0x00007FFB9CFC2000-memory.dmp

      Filesize

      10.8MB

    • memory/2556-13-0x00007FFB9C500000-0x00007FFB9CFC2000-memory.dmp

      Filesize

      10.8MB

    • memory/2556-16-0x00007FFB9C500000-0x00007FFB9CFC2000-memory.dmp

      Filesize

      10.8MB