Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
07-04-2021 16:03
Static task
static1
Behavioral task
behavioral1
Sample
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe
Resource
win10v20201028
General
-
Target
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe
-
Size
120KB
-
MD5
ff0e2ce0af118bae62969a5e897b59b2
-
SHA1
5bc65c73cae94509905c6a4ba657a61360bb96f2
-
SHA256
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85
-
SHA512
7f205bc47555b356b7f9901a43d8b1a597128041a0b3c12109f3396bce095d2e96b4b9bede21d319ac27ff0b924c0e13cf3b19076bc31406b8278d39a7a2c8e9
Malware Config
Extracted
C:\8486m452-read-me-ATTRATTIVO.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4C18BC3B1C73A46F
http://decoder.re/4C18BC3B1C73A46F
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exedescription ioc Process File opened for modification \??\c:\users\admin\pictures\ImportConvertTo.tiff 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\ImportConvertTo.tiff => \??\c:\users\admin\pictures\ImportConvertTo.tiff.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\StepRead.raw => \??\c:\users\admin\pictures\StepRead.raw.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\BlockLock.png => \??\c:\users\admin\pictures\BlockLock.png.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\ConnectStart.tiff => \??\c:\users\admin\pictures\ConnectStart.tiff.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\users\admin\pictures\ExportConvertTo.tiff 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\FindMove.tiff => \??\c:\users\admin\pictures\FindMove.tiff.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\HideExpand.tif => \??\c:\users\admin\pictures\HideExpand.tif.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\users\admin\pictures\ConnectStart.tiff 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\ExportConvertTo.tiff => \??\c:\users\admin\pictures\ExportConvertTo.tiff.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\users\admin\pictures\FindMove.tiff 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File renamed C:\Users\Admin\Pictures\RepairConfirm.png => \??\c:\users\admin\pictures\RepairConfirm.png.8486m452 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exedescription ioc Process File opened (read-only) \??\B: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\H: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\J: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\L: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\Q: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\T: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\X: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\A: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\F: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\G: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\M: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\N: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\V: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\W: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\Y: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\I: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\K: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\P: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\R: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\S: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\U: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\Z: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\E: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\O: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened (read-only) \??\D: 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7srst416l2x.bmp" 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe -
Drops file in Program Files directory 34 IoCs
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exedescription ioc Process File opened for modification \??\c:\program files\GetRepair.dotx 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\OutResize.zip 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File created \??\c:\program files\8486m452-read-me-ATTRATTIVO.txt 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\ConvertResume.mp4v 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DisconnectImport.inf 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DisconnectSkip.ex_ 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\TestUnregister.docm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DisconnectRename.m4a 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\EnterExport.wax 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\JoinAdd.mpe 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\SendRedo.bmp 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\AssertExit.ex_ 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\LimitRegister.dotm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\LimitSplit.rle 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\WatchInvoke.3gpp 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\InitializePublish.mpeg2 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\InvokeRestart.vstm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\SelectSkip.vbs 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\GetEdit.docx 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\RestoreMerge.mhtml 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\UndoProtect.tmp 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\AssertReset.rm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DenyProtect.3gp2 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DisableUnpublish.vst 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\EnterStep.htm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File created \??\c:\program files (x86)\8486m452-read-me-ATTRATTIVO.txt 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\DisconnectReceive.midi 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\ExitWatch.svgz 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\UnprotectBackup.ttf 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\WaitPing.mp2 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\CompareRemove.sql 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\GrantConvert.potm 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\UpdateReceive.jpe 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe File opened for modification \??\c:\program files\UseStop.rmi 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exepid Process 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exevssvc.exedescription pid Process Token: SeDebugPrivilege 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe Token: SeTakeOwnershipPrivilege 4764 52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe Token: SeBackupPrivilege 2232 vssvc.exe Token: SeRestorePrivilege 2232 vssvc.exe Token: SeAuditPrivilege 2232 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe"C:\Users\Admin\AppData\Local\Temp\52612bceee07152f2e2e6699b3c085149e11979f34fe248bda14e03a0d950e85.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3444
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232