Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
29-07-2020 14:02
Static task
static1
Behavioral task
behavioral1
Sample
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe
Resource
win10
General
-
Target
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe
-
Size
135KB
-
MD5
c77bd2ccabf797907546b37f1fc710b8
-
SHA1
2185a4adb041f3207320fdf80f4125d00cd135ee
-
SHA256
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191
-
SHA512
e4585de808ac7313b7751ea91b0407628d508329cc646215e5df2af967d7c0036d3c0c9c082ad590e716b0a8fe9e64a8050364db401a3453980b9fab1eb15a21
Malware Config
Extracted
C:\ywh3ggtc7-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8B88B78F402F5B52
http://decryptor.cc/8B88B78F402F5B52
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe Token: SeDebugPrivilege 3856 powershell.exe Token: SeBackupPrivilege 3904 vssvc.exe Token: SeRestorePrivilege 3904 vssvc.exe Token: SeAuditPrivilege 3904 vssvc.exe Token: SeTakeOwnershipPrivilege 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe -
Suspicious behavior: EnumeratesProcesses 77 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exepowershell.exepid process 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3856 powershell.exe 3856 powershell.exe 3856 powershell.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exedescription pid process target process PID 3100 wrote to memory of 3856 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe powershell.exe PID 3100 wrote to memory of 3856 3100 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe powershell.exe -
Enumerates connected drives 3 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4dfb4p5d6o6.bmp" 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Z5egGonjst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe" 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Drops file in Program Files directory 21 IoCs
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exedescription ioc process File opened for modification \??\c:\program files\ReadOptimize.ADT 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\SyncStep.mht 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\TestTrace.aifc 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\FormatWatch.tif 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\LockReset.docx 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\OpenTrace.png 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\UnregisterSave.m1v 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\InitializeGet.ods 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\LimitSubmit.pptx 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\UnpublishDisable.mpeg2 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\MountRestart.mpeg3 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\SkipPublish.TS 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\SuspendSkip.reg 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\UndoRedo.M2T 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File created \??\c:\program files (x86)\ywh3ggtc7-readme.txt 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\ConnectExpand.odt 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\GroupProtect.mpp 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\UpdateRepair.js 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File created \??\c:\program files\ywh3ggtc7-readme.txt 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\EditUnprotect.midi 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\program files\InstallInvoke.odt 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\NewTrace.tiff => \??\c:\users\admin\pictures\NewTrace.tiff.ywh3ggtc7 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File renamed C:\Users\Admin\Pictures\ResumeGrant.raw => \??\c:\users\admin\pictures\ResumeGrant.raw.ywh3ggtc7 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File renamed C:\Users\Admin\Pictures\ApproveSplit.tif => \??\c:\users\admin\pictures\ApproveSplit.tif.ywh3ggtc7 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File renamed C:\Users\Admin\Pictures\EditSync.tif => \??\c:\users\admin\pictures\EditSync.tif.ywh3ggtc7 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe File opened for modification \??\c:\users\admin\pictures\NewTrace.tiff 681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe"C:\Users\Admin\AppData\Local\Temp\681836cd8181c784646b39238d8e4d9323b91c71690894782220e2678c1f3191.bin.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Sets desktop wallpaper using registry
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies extensions of user files
PID:3100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3448
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:3904