Ransomware actors are specializing, collaborating and assisting each other to conduct sophisticated attacks that are becoming increasingly difficult to prevent. Combating these groups effectively similarly requires a team approach — specialization, understanding tactics and techniques and how to counter them and cutting off activity at its source. Arguably, it has never been more imperative that cybersecurity specialists work together to counter a specific cyber threat.

IBM Security X-Force Threat Intelligence and Incident Response teams have found that collaboration has a force-multiplying effect in countering ransomware attacks. Intelligence on ransomware groups can help inform and prioritize defenses, and in the event of an attack, accelerate the incident response process by providing direction and augmenting investigative findings. In addition, data collected during ransomware investigations enhances analysts’ understanding of ransomware groups, how they operate and how potential victims can counter their tactics.

To illustrate these points, this blog will examine a collection of Sodinokibi TTPs through various ransomware attacks in-depth and highlight the ways intelligence and incident response work together to inform defenses against ransomware operators. Together, intelligence and incident response teams can better contain attacks in their early stages before ransomware deployment, address full deployment attacks and quickly remediate the incident. By sharing this information, we anticipate organizations will be better able to prevent and defend against a variety of different ransomware attacks.

Why Examine Sodinokibi?

X-Force incident response data underscores the significant threat from Sodinokibi (also known as REvil) ransomware attacks over the past two years. In fact, Sodinokibi made up 29% of all X-Force ransomware engagements in 2020 and jumped to 37% of ransomware engagements in the first half of 2021. Although Sodinokibi infrastructure was partially shut down in early July 2021, and X-Force has not observed ransomware attacks from the cartel since that time, the tactics, techniques and procedures (TTPs) this group uses are common across several groups. We anticipate the operators behind Sodinokibi activity will resume work on ransomware operations again in the future, probably under a different name.

Stage 1: Initial Access Through QakBot Infections

In more than one Sodinokibi attack, X-Force incident response has observed the threat actors gain initial access through a QakBot infection delivered via a phishing email containing a Microsoft Office attachment or URL. While QakBot started out over a decade ago as one of the top banking Trojans to emerge from the Eastern European cyber crime arena, nowadays it is used for its foothold in company networks. Several ransomware groups use QakBot as an initial access vector, including ProlockEgregor and, of course, Sodinokibi. QakBot operators specialize in gaining initial access through phishing emails and then sell this access to cyber crime counterparts including ransomware actors, who conduct reconnaissance, move laterally, steal data and deploy ransomware.

X-Force has observed QakBot phishing emails utilizing information gathered from hijacked email threads with subject lines involving unpaid invoices to entice a recipient to click on a link or open an attachment.

To further establish a sense of legitimacy with the recipient, QakBot weaponized Microsoft Office documents will present a ‘DocuSign’ image containing instructions to enable the payload to execute.

Figure 1: Microsoft Excel document containing QakBot DocuSign lure

In the QakBot to Sodinokibi incidents X-Force has observed, a phishing email with a compressed archive attachment containing a Microsoft Excel spreadsheet was sent to a recipient in response to an existing e-mail thread. To evade detection, QakBot maldocs have not utilized traditional malicious VBA macros to deliver the payload. Instead, QakBot maldocs leverage Excel 4.0 macros, hidden spreadsheet formulas and BIFF data. Upon execution, the QakBot maldoc will initiate a download of a dynamic link library (DLL), which is the QakBot loader fetched via a call to URLDownloadToFileA. The loader is loaded via the DllRegisterServer function within rundll32.exe.

After passing some anti-analysis checks, the QakBot loader will execute the main QakBot payload and establish persistence through a scheduled task that loads QakBot via rundll32.exe or regsvr32.exe.

Figure 2: QakBot loader downloader within a hidden Microsoft Excel sheet named “Bob”

Figure 3: Hidden Microsoft Excel formulas referencing data in hidden “Bob” sheet

Initial Access Through Valak Infections

In other incidents, X-Force has observed Sodinokibi operators gaining initial access through a Valak malware infection. Valak itself was delivered via phishing emails with password protected and compressed archives containing malicious Word documents that advise the recipient to enable macros through a Microsoft Word version mismatch lure.

Figure 4: Valak maldoc lure

Upon execution, the maldoc downloads a Valak loader DLL as a .tmp file which executes an embedded JavaScript payload via wscript.exe. Once Valak has been loaded onto the target system, the malware will check in with the command-and-control servers (C2), copy itself to the registry, and create a scheduled task for persistence which leverages alternate data streams (ADS) to evade detection.

Figure 5: Valak loader macro

Figure 6: Valak persistence

Stage 2: Transfer to Ransomware Actors

After gaining persistence on the victim’s system, the QakBot and Valak operators probably sold their access to an affiliate working directly with Sodinokibi ransomware. After transferring access, the Sodinokibi actor begins some manual processes, usually downloading additional tools such as Cobalt Strike to establish interactive access on the infected host.

Cobalt Strike is a commercial offensive security toolset that many ransomware operators have adopted as their primary post-exploitation tool. Some of those are the DarkSide gangEgregor, Clop, Ryuk, DoppelPaymer, Sodinokibi and several others.

In some instances, Sodinokibi operators have downloaded the legitimate remote access tool NetSupport Manager as a second stage remote access tool. This tool is used to download and execute PowerShell payloads and establish additional C2 communication channels.

Figure 7: Valak NetSupport Manager secondary payload

Stage 3: Recon and Credential Harvesting

After downloading additional tools and establishing interactive access to a compromised system, the Sodinokibi actors frequently perform system and Active Directory reconnaissance using living-off-the-land tools, those tools that are inherent to the victim’s operating system or legitimate system administration tools such as AdFind and that rarely appear malicious to security controls.

Through various Sodinokibi attacks, X-Force has observed common reconnaissance operations including enumerating lists of domain workstations and servers, domain administrators, domain controllers, local users and groups and running processes.

Figure 8: Active Directory recon using nltest and AdFind

With another commercial pentesting tool in play, X-Force has observed Sodinokibi operators repeatedly harvesting credentials using Mimikatz to escalate privileges and move laterally within the compromised environment.

Some Sodinokibi operators also commonly execute lateral movement operations through the creation of a new service on the target host, which uses the service control manager (SCM) to execute a PowerShell payload.

Alternatively, in some attacks, Sodinokibi operators have leveraged admin shares to stage a malicious binary on a remote host and subsequently configure a new service to execute the binary to move laterally.

Figure 9: Sodinokibi lateral movement via new service

Lateral movement, reconnaissance and credential harvesting operations continue until the Sodinokibi operators have obtained privileged access to the environment and to the organization’s data repositories for eventual data exfiltration.

An interesting observation that X-Force has made over the course of several Sodinokibi investigations is that the Sodinokibi operators have switched remote access channels from post-exploitation tools to leveraging tools such as plink.exe and ngrok.exe. They use these tools to tunnel RDP traffic from servers over web application protocols. These techniques allow cyber criminals to bypass firewall restrictions when they move into the data collection and exfiltration stage.

Figure 10: RDP tunneling evidence in Windows Event Logs

Exfiltrating data is a critical part of how ransomware gangs build leverage. They use the stolen data to extort the victimized company if the latter chooses to forego payment for a decryption key.

Stage 4: Data Collection and Exfiltration

Like many other ransomware operators, Sodinokibi operators incorporate data exfiltration as part of a double extortion tactic to increase the probability of a payment as a result of the compromise.

X-Force IR observed that Sodinokibi operators often access remote file shares to stage data to a single compromised system and leverage tools such as Rclone, MegaSync, MegaCmd and WinSCP to exfiltrate data from the compromised environment.

During investigations of Sodinokibi ransomware incidents, X-Force has determined that the threat actors spend most of the compromise within the data collection and exfiltration phase.

During one Sodinokibi incident X-Force investigated, the operator spent nine days performing data collection and exfiltration out of a total of eleven days from the point the actor established interactive access to the network.

The types of data Sodinokibi operators target include:

  • Point of sale (POS) data that includes payment card data
  • Supervisory Control and Data Acquisition (SCADA) data
  • Data marked ‘confidential’
  • Initial Public Offering (IPO) or stock market data
  • Intellectual property (IP) (e.g. source code, Gitlab backups, etc.)
  • Payment card information (PCI)
  • Personally identifiable information (PII)
  • Protected health information (PHI) (e.g. ultrasound, patient prescription details, mental health summaries, etc.)
  • Financial planning and investment
  • Accounting data
  • Human resources (HR) data
  • Internal communications
  • Backups
  • Client data
  • Passports
  • Customer contracts
  • Vendor sensitive data

Stage 5: Ransomware Deployment

After completing the data exfiltration phase, the Sodinokibi operators will leverage their privileged access to pivot to access a compromised domain controller.

From the domain controller, the threat actor can stage ransomware and then deploy it using domain administrator credentials via PSExec, server message block (SMB) protocol and group policy object (GPO). Use of GPO in multiple Sodinokibi attacks has enabled threat actors to also disable Microsoft Windows Defender to inhibit target protections against the ransomware.

In one Sodinokibi ransomware incident that X-Force investigated, after completing the exfiltration of 92 GB of data through the Rclone tool, the threat actors accessed a domain controller through RDP and created a new GPO which modified the following registry key to disable Windows Defender.

HKLM \SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware

The threat actors then linked the new GPO to the root of the domain and created eight new line-separated text files containing 8,771 hostnames from Active Directory.

Once Windows Defender was disabled, the threat actor created eight BAT files in the C:\Windows directory.

X-Force IR recovered these binaries and determined that they loop through the eight previously mentioned text files, authenticate to each host using a service account via the SMB protocol, copy a DLL to the C:\Windows directory and use the Windows Management Instrumentation (WMI) utility to execute the DLL with Rundll32.exe on the target host.

X-Force malware analysts confirmed the DLL as a Sodinokibi ransomware payload.

Figure 11: BAT file “wmi4.bat” that the attacker used to deploy ransomware using WMI

Investigation: Where Intelligence and Incident Response Meet

While assisting IBM clients with remediating Sodinokibi ransomware attacks, X-Force threat intelligence has provided context, research and assistance to the incident response team that has enhanced investigation and informed remediation.

In some cases, intelligence analysts have been able to pivot on a single indicator of compromise (IOC) from an attack and, through research and enrichment, pave the way for additional analysis. These capabilities illuminate new systems for investigation and open doors for the incident response team that would otherwise have remained closed.

This process is mutually beneficial, as it also provides threat intelligence teams with additional insight on threat actors and indicators for detecting them. For example, an IR request for intelligence to examine one internet protocol led to insight on a recent phishing campaign connected to several different email addresses. At the same time, the team pointed to Transmission Control Protocol (TCP) scanning activity and threat actor activity related to both ransomware attacks and Trojan infections.

In addition to IOCs, the X-Force threat intelligence team closely tracks the TTPs associated with dozens of threat groups, including ransomware groups and their affiliates. These TTPs are changing rapidly, and as threat intelligence teams identify changes they can relay these shifts to incident response consultants working on related cases.

The availability of IR and intelligence professionals that tag team is a process that augments forensic analysis and enables consultants to search artifacts for specific TTPs. They can also identify more suspicious activity that is most likely to be relevant to the investigation. For example, Sodinokibi’s exploitation of a zero-day and supply chain attack involving Kaseya in early July 2021 represented a significant shift in the group’s behavior that altered X-Force IR’s examination of initial infection vectors for Sodinokibi attacks.

In some cases, intelligence insight can warn of potential Sodinokibi activity. For instance, in one incident IR investigated, even before any malware was found, intelligence analysts noted that some identified IPs and use of Rclone could be indicative of precursor activity to ransomware deployment — and specifically Sodinokibi. Fortunately, defenders were able to identify and remediate the activity quickly and the attackers never reached the ransomware deployment stage in this operation.

Remediation: Shoring Up Potential Victims Against Future Attacks

X-Force IR has assisted numerous clients with containing ransomware attacks, eradicating threat actors from compromised networks and recovering business operations. Once an incident is fully contained, organizations commence the recovery effort — often a complex undertaking that requires strong cross-functional collaboration.

In many cases, rebuilding or restoring the compromised systems according to the incident timeline is the first step in recovery, but recovery alone is not sufficient. Organizations need to reduce their attack surface and remediate security weaknesses exploited by the threat actor to minimize the risk of similar attacks occurring in the future. Our team has assisted many clients with these activities, providing recommendations on controls to improve the overall security posture of any network.

Some of the short-term controls frequently recommended by X-Force include:

  • Deploying a local administrator password solution (LAPS)
  • Reducing the SMB protocol’s attack surface
  • Hardening systems against credential harvesting attacks
  • Prohibiting workstation and server logins with enterprise administrator (EA) and domain administrator (DA) credentials
  • Deploying a secure administrative host for access to trusted security zones
  • Monitoring elevated privilege accounts, including service accounts
  • Deploy an endpoint detection and response (EDR) tool

In the medium term, X-Force often recommends that victims focus on designing a delegation model, enforcing the principle of least privilege for security principals and separating administrative credentials into administrative tiers. Privileged accounts should always be protected by strong passwords and a multi-factor authentication scheme.

In the longer term, potential ransomware victims might want to explore a range of options that would enhance the security posture of the network and minimize the risk of successful network intrusion by ransomware operators. Some of the controls include:

  • Developing a vulnerability management program
  • Segmenting an internal network to reduce the possibility of lateral movement
  • Implementing privileged access management (PAM) to manage and secure the credentials for privileged accounts, including users with elevated privileges, local and Active Directory (AD) accounts, system administrators and super users, service accounts and application accounts, among others.
  • Implementing multifactor authentication (MFA) to enhance security in scenarios where the risk of compromised credential use is the greatest.

Keep up to date on IBM X-Force blogs and emerging research here.

If your organization requires assistance with incident response and intelligence services, IBM X-Force stands by 24/7.

US Hotline: 1-888-241-9812

Global hotline: +001 (312) 212-8034

More from Incident Response

How I got started: Incident responder

3 min read - As a cybersecurity incident responder, life can go from chill to chaos in seconds. What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role?With our How I Got Started series, we learn from experts in their field and find out how they got started and what advice they have for anyone looking to get into the field.In this Q&A, we spoke with IBM’s own Dave Bales, co-lead X-Force Incident Command…

How Paris Olympic authorities battled cyberattacks, and won gold

3 min read - The Olympic Games Paris 2024 was by most accounts a highly successful Olympics. Some 10,000 athletes from 204 nations competed in 329 events over 16 days. But before and during the event, authorities battled Olympic-size cybersecurity threats coming from multiple directions.In preparation for expected attacks, authorities took several proactive measures to ensure the security of the event.Cyber vigilance programThe Paris 2024 Olympics implemented advanced threat intelligence, real-time threat monitoring and incident response expertise. This program aimed to prepare Olympic-facing organizations…

How CIRCIA is changing crisis communication

3 min read - Read the previous article in this series, PR vs cybersecurity teams: Handling disagreements in a crisis. When the Colonial Pipeline attack happened a few years ago, widespread panic and long lines at the gas pump were the result — partly due to a lack of reliable information. The attack raised the alarm about serious threats to critical infrastructure and what could happen in the aftermath. In response to this and other high-profile cyberattacks, Congress passed the Cyber Incident Reporting for Critical…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today