Analysis

  • max time kernel
    124s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 09:42

General

  • Target

    2024-06-12_07887580c8d8c896575794372fea0e5b_revil_sodinokibi.exe

  • Size

    156KB

  • MD5

    07887580c8d8c896575794372fea0e5b

  • SHA1

    e19bdafbc1925f4072c70dbe3989ccb49be18186

  • SHA256

    daac7c8703b72e04eac96278222c6325b63825416ad58d59125621f7ca936c9a

  • SHA512

    33a927cc575c6a0ee9a50c8d397ef6f09c94ed0d52e9aa41ecec303ebfcee019c17c26645f457fb54c97566c586e866c65ee1065f97766d3a0288828a40fadf7

  • SSDEEP

    1536:L1bolsa+dSn91zyKRpK63R7Pbi4eTMluxtXDCntTnICS4Ahbulmwd9jUlhQP4t4:vdo1zyKzVLbi4eTMlwDCnuuwIIn+

Malware Config

Extracted

Path

C:\Users\Default\p108g02xn-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion p108g02xn. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E883FE1D92851F46 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/E883FE1D92851F46 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 3FXwsVmNfoOdD9XT7PsUZ3VhUkl/GuXSo9Wkwd2i9PRDpoxyMTa1iLDugDnaueDQ aCBuD/G/IV8TyJlyEU4O3SXGvetMM3gTPFJBV23D6KLWxNLt/3m4CWmFCgBcsCU1 Z5iw1s+NGDYJbVuX9CdEOAkhVijlmZGAmNCIucT6evSH2tDMcRzbN2APf4uLiC5/ 3LZzW7UTH1nCkon5rx2lQXGbjXqByva7wGWtAlBxPSFE84maWdaRAY1ssVEZSWBJ cPbWjxt2wlG+8zK8gX5eX+jHYSL7d8KuKH5VH7OyQ4Vp9VGD59X5JJIt6sWMQp4j bPdcwTJ3/EvHt3GG6xDTQaLwjWUmRLK7vCS+Xhi5V5fWOlSeo5fP304IpFUXZAb5 wEapU8PX8kcs6wfUZGE+cg2Qj+kFoMJ10KO9kCvNNlz0/6fvcwvv8E72Uj3CpCMd Mqd2XvUSA4LgOx166lEuq7Hlrx8l7jpTIc2BWhsoRwBuaAJ5RfwKmPZXSE/NzA9/ bgYwXrK/dqwFrqbuUTx5ewOvM4OVZ+AdIOKNGGGwXb5AGP0gqVA5M3/Iuwdi+zcS VJrbh/mShvl0BUMhYzoe8DjjezeN5DjcZWcCNjR4RApZI9x+BkUXJpVCwVTzaQfm kUm31lX/lrsJo1c6bybOQbOO7obT99sTmLpLuMz8/MjVUTZngaz8nomiCbbhuBe5 CQkfxmA4hCksZN63fTOZ/3NHLDEZMlhiXpl0n509i9/3sWIFXqyN3d6/gmi1me3s ZbnTWRQCD4ale/Zuzx/uwtl2DUwXvpJt3aHjS3e6nkKd09ItzUHd4ZCeNKYZqjhA YVgfpaPpvkO+gMW0RrfrGg5xzcR6gWZI2E09PLnswHnUMW15R6ufJ7lUwKNui1yA AnfpimQw0YJv0znpauTwZZw93DSjl8D17jy+92ryeJfXfwTf4F7EyjoM/lWydn9Z m81Y5P/+iYYXDj00AeIsjZAJoDsMfrFu21f8hzzFVGp90ZgYc60xeYq1/IB0yIVr CW+Ge056YWYKvlLk+G3cyzXJixSMCHgx9Z5viqAf8dnjLjCmvhVzsAU3bOQzvrLu 23bDA4npIG6+TXklz1pKZDfiy2e4VDeJHIfebc1ndoCf61U93wTwFmSf1qYCb725 UL9DYQpXmbBv9msuQ4JhkDnkWec6lz4I0H+qaej7wjw= Extension name: p108g02xn ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E883FE1D92851F46

http://decryptor.top/E883FE1D92851F46

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Renames multiple (141) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-12_07887580c8d8c896575794372fea0e5b_revil_sodinokibi.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-12_07887580c8d8c896575794372fea0e5b_revil_sodinokibi.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
        PID:2296
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3924,i,10925946972013221578,8820669985803190952,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
      1⤵
        PID:1664

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      1
      T1005

      Impact

      Defacement

      1
      T1491

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Default\p108g02xn-readme.txt
        Filesize

        6KB

        MD5

        c49ddfff3ee3a4727b3877f6beba58d0

        SHA1

        2e980b2a3cc8a0b06ca6e2da3fdf4ff01344066d

        SHA256

        64a571c7983b7a8110f73826ca252fe526b6517af917e69f53b3638a07e610d8

        SHA512

        facb38552bc9c54632dc5a39c938634f33e1cfc4a9df0a90e64e83618469a92cfb483e59e90e64329b0a34daf3f414f3bd0adb6006ced462f14b2b81a2e3060e