Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 10:01

General

  • Target

    sodinokibi.exe

  • Size

    419KB

  • MD5

    3e6a72b0f6778422369d94a3e00c2f95

  • SHA1

    4bd315cc0def2715fe4a5321906cbe30845d9640

  • SHA256

    0a8e37f435974e898215e0dcc10628d4a18e996e13b268f8e787ee03d722bcc1

  • SHA512

    0e7351b043c7c7e6ce236569a685b52b01ec8c57889f95daa3bed7c26025994f77747def5a2a9303a8d333c61e0c2033802639eecc5a53abaa59063501c223e6

  • SSDEEP

    12288:0DjHzrgnzomId3DXTdfR2QhcTlFG6+LliF:0/zqAdL5fvhc2liF

Malware Config

Extracted

Family

sodinokibi

Botnet

30

Campaign

97

Decoy

rivermusic.nl

awag-blog.de

endstarvation.com

sveneulberg.de

oro.ae

four-ways.com

palema.gr

slotspinner.com

mindfuelers.com

wirmuessenreden.com

happylublog.wordpress.com

perfectgrin.com

loysonbryan.com

bridalcave.com

jobscore.com

mundo-pieces-auto.fr

ciga-france.fr

ronaldhendriks.nl

insane.agency

zwemofficial.nl

Attributes
  • net

    true

  • pid

    30

  • prc

    sqbcoreservice

    sqlservr

    powerpnt

    synctime

    dbeng50

    winword

    visio

    sqlagent

    mydesktopservice

    mspub

    steam

    xfssvccon

    sqlwriter

    outlook

    onenote

    mydesktopqos

    mysqld

    wordpad

    excel

    isqlplussvc

    msaccess

    mysqld_opt

    mysqld_nt

    ocautoupds

    thunderbird

    thebat64

    ocssd

    agntsvc

    encsvc

    sqlbrowser

    firefoxconfig

    dbsnmp

    msftesql

    oracle

    ocomm

    tbirdconfig

    thebat

    infopath

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    97

  • svc

    mepocs

    vss

    sql

    svc$

    veeam

    sophos

    backup

    memtas

Extracted

Path

C:\Users\9khp35h-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 9khp35h. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/189B84050B8B005A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/189B84050B8B005A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: TwCiV48g49lgAdLGZyVzzeuER/z5Wea5/dO8kH6Hew11TPSlqRqPcOQ9Fsrv4kX9 AzEXiaDvCSqb9Kc8jCVANMY2r8LL9Lb0U1nr/qNjLGPz1miEBTtDCq5e4iaQP1+e enWBwaM9kwedxn+sooKUfwVXNbMJJuMRkwQui5S+EooAp1OqAZ2/f35iIMXP0bZN dEyp1S2O7xSw69NgRyM+NKdm+Y/6EoRsLCklAcGL5FpVaCPotS8qP2aFm3EzIVlI fhY/UUP0O1LrNdn+M2PpSXzIwMZLwWWJp4Cr19Fsc6oQmovVG3OgbMz8//KLdkNn pAC8iIspf2qv4QILsnXXjpeFLJrjD7j0Okm5iSmnW7zSpy+L1w0ZTWM1w9y7Oumm DWA++KZCiAX5rkqw7jXSQzX5ig9SaK2LCTPqZkQqdIvK5WUTDlWA5CSII5EtcaYX DJW3ThuixGZ06ml0YkZk7Df9O3m2UDQLHh3TN+51iwsKH4aUlQ6VKYmj2ymPjDc/ 1kphL8uQGTgr4wl8FeK4tGCJWrjZEqAo+kCeBvnSOgQT1NfxcgTMqx/q+B7+xCnG ExGVH9NJ/XEe7lhMS9dgwYYeWBTeorLXxqi4r4HH+gEx2mJdfgWF4knZ3aX7bHgC Jy4YNWBgkaVnsCOH27IthPfTZRwjw3Xf4AOUycUTiaDewGmDsAvplqzPTtMmF4ZG OhvXheg1xaavOXILWN5FgnzhZPwGrVVjsktkG1ddfKzhllpw3h0wcNxsbW1TwHf+ jrd7B2i42EK/HzVUCgLUMpcmjX95tXgLlHjILOxgu3RmFNk7rtCaul7eiCdAHE5i fDwnEiaIm9+DmMvKIeHRWK+uN/PIiGBYAqwZZBmdsk8wawV+6KmNPt4ocyf4Hcw8 0V8K9z4AgVXY2Ak56mzwxnHB9iOpo4WiPdKoYiQHD1fY5Z2aBOVaxM9n0TPm0dcW bsV/3mmyGzjYVYMPmnXcls01UzYg9bGd9zi4/VZ+4DXXpHyywpp4Zm81MvVv1G5u bCCmC159+bE7WmUtkSbC4dCAILE5ISIf908OIKChJ9cmS60gqN4CdAnIDBxDadND STa+0W/Md5imY7stVSfbNI3+PPTrLzllaPPwi9EYODIzC4NsvGgAb6xeuayR19kk Fzr9IVJsTU68cAOxaYvPLg9sZGw/nBHXshGAhJVP294kH0FQfVX+1It0FnK7+msF O1bVPW2Kt+53D8BByujbaQ== Extension name: 9khp35h ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/189B84050B8B005A

http://decryptor.top/189B84050B8B005A

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Detects command variations typically used by ransomware 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe
    "C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
        PID:4652
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:820

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      1
      T1005

      Impact

      Defacement

      1
      T1491

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\9khp35h-readme.txt
        Filesize

        6KB

        MD5

        bc7df711e93117c3daaf37a899e2b045

        SHA1

        b300a9ca9b75015a3f3dc99e807db2cc4d33a88a

        SHA256

        9c49bb49d944d53370a79c00f545bae1214e661a4dc011b749b1dc882d0f081d

        SHA512

        4573200363cb5293d003d4eb10b1a250bae26bead01d5cb22db8f492cc2d35069c95ad5b6f5dc288419425a178860a0491814ca7d1647dd7da3282d2c58037db

      • memory/3124-2-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/3124-1-0x00000000005A0000-0x00000000006A0000-memory.dmp
        Filesize

        1024KB

      • memory/3124-3-0x0000000000400000-0x0000000000516000-memory.dmp
        Filesize

        1.1MB

      • memory/3124-4-0x00000000005A0000-0x00000000006A0000-memory.dmp
        Filesize

        1024KB

      • memory/3124-6-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/3124-445-0x0000000000400000-0x0000000000516000-memory.dmp
        Filesize

        1.1MB

      • memory/3124-446-0x0000000000400000-0x0000000000516000-memory.dmp
        Filesize

        1.1MB

      • memory/3124-448-0x0000000000400000-0x0000000000516000-memory.dmp
        Filesize

        1.1MB

      • memory/3124-449-0x0000000000400000-0x0000000000516000-memory.dmp
        Filesize

        1.1MB

      • memory/3124-450-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB