Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-12-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
sodinokibi.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
sodinokibi.exe
Resource
win10-en-20211208
General
-
Target
sodinokibi.exe
-
Size
143KB
-
MD5
a3749c66f65d247d8a6fae1be26d3ef9
-
SHA1
c394464bba56e62ddfe2c9073932fb656fb78b6c
-
SHA256
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c
-
SHA512
65bc1dba7e4de098e6b27b13b1e0723f703f645e4a4c6e53b7b03ec096a70d48ec2aca7e8bcd911ced61bab35e95983510604421ef35a593278414bfbb1cb01c
Malware Config
Extracted
C:\0xt83q-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FA5AC37CBF202AC6
http://decryptor.top/FA5AC37CBF202AC6
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
sodinokibi.exedescription ioc process File renamed C:\Users\Admin\Pictures\OpenGrant.crw => \??\c:\users\admin\pictures\OpenGrant.crw.0xt83q sodinokibi.exe File renamed C:\Users\Admin\Pictures\ConvertToAssert.png => \??\c:\users\admin\pictures\ConvertToAssert.png.0xt83q sodinokibi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
sodinokibi.exedescription ioc process File opened (read-only) \??\G: sodinokibi.exe File opened (read-only) \??\H: sodinokibi.exe File opened (read-only) \??\K: sodinokibi.exe File opened (read-only) \??\L: sodinokibi.exe File opened (read-only) \??\V: sodinokibi.exe File opened (read-only) \??\D: sodinokibi.exe File opened (read-only) \??\P: sodinokibi.exe File opened (read-only) \??\B: sodinokibi.exe File opened (read-only) \??\F: sodinokibi.exe File opened (read-only) \??\J: sodinokibi.exe File opened (read-only) \??\M: sodinokibi.exe File opened (read-only) \??\O: sodinokibi.exe File opened (read-only) \??\Q: sodinokibi.exe File opened (read-only) \??\R: sodinokibi.exe File opened (read-only) \??\U: sodinokibi.exe File opened (read-only) \??\X: sodinokibi.exe File opened (read-only) \??\A: sodinokibi.exe File opened (read-only) \??\E: sodinokibi.exe File opened (read-only) \??\I: sodinokibi.exe File opened (read-only) \??\N: sodinokibi.exe File opened (read-only) \??\S: sodinokibi.exe File opened (read-only) \??\T: sodinokibi.exe File opened (read-only) \??\W: sodinokibi.exe File opened (read-only) \??\Y: sodinokibi.exe File opened (read-only) \??\Z: sodinokibi.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
sodinokibi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4a05my.bmp" sodinokibi.exe -
Drops file in Program Files directory 44 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification \??\c:\program files\FormatClose.xla sodinokibi.exe File opened for modification \??\c:\program files\PushReset.emz sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\ConvertWrite.M2V sodinokibi.exe File opened for modification \??\c:\program files\EnterSet.aifc sodinokibi.exe File opened for modification \??\c:\program files\PushInitialize.xsl sodinokibi.exe File opened for modification \??\c:\program files\RemoveSkip.ogg sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\0xt83q-readme.txt sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\DebugMove.vsd sodinokibi.exe File opened for modification \??\c:\program files\FormatWatch.temp sodinokibi.exe File created \??\c:\program files (x86)\0xt83q-readme.txt sodinokibi.exe File opened for modification \??\c:\program files\BackupAssert.wpl sodinokibi.exe File opened for modification \??\c:\program files\PushTrace.pptm sodinokibi.exe File opened for modification \??\c:\program files\SplitDisable.pdf sodinokibi.exe File opened for modification \??\c:\program files\UndoCompare.odt sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\d60dff40.lock sodinokibi.exe File created \??\c:\program files\0xt83q-readme.txt sodinokibi.exe File created \??\c:\program files\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\PingUnblock.mp3 sodinokibi.exe File opened for modification \??\c:\program files\DisconnectCopy.htm sodinokibi.exe File opened for modification \??\c:\program files\OpenEnable.wm sodinokibi.exe File opened for modification \??\c:\program files\SkipUnprotect.potx sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\0xt83q-readme.txt sodinokibi.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\0xt83q-readme.txt sodinokibi.exe File opened for modification \??\c:\program files\DenyImport.odt sodinokibi.exe File opened for modification \??\c:\program files\RepairHide.wax sodinokibi.exe File opened for modification \??\c:\program files\ProtectUninstall.M2TS sodinokibi.exe File opened for modification \??\c:\program files\ResumeUse.potx sodinokibi.exe File opened for modification \??\c:\program files\SelectLock.clr sodinokibi.exe File opened for modification \??\c:\program files\ConfirmJoin.clr sodinokibi.exe File opened for modification \??\c:\program files\InitializeEdit.mpeg3 sodinokibi.exe File opened for modification \??\c:\program files\DisableConvert.mhtml sodinokibi.exe File opened for modification \??\c:\program files\GetPop.js sodinokibi.exe File opened for modification \??\c:\program files\SaveRemove.txt sodinokibi.exe File created \??\c:\program files (x86)\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\AssertFormat.ex_ sodinokibi.exe File opened for modification \??\c:\program files\FormatEdit.tiff sodinokibi.exe File opened for modification \??\c:\program files\PingShow.mht sodinokibi.exe File opened for modification \??\c:\program files\SelectEdit.mpe sodinokibi.exe File opened for modification \??\c:\program files\ShowWait.clr sodinokibi.exe File opened for modification \??\c:\program files\SplitProtect.cr2 sodinokibi.exe File opened for modification \??\c:\program files\ConvertFromStep.pot sodinokibi.exe File opened for modification \??\c:\program files\DismountUnpublish.csv sodinokibi.exe -
Drops file in Windows directory 64 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_6.1.7600.16385_de-de_2e452ff3e70e56b2_rtm.dll.mui_55e4e990 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-userenv_31bf3856ad364e35_6.1.7601.17514_none_ee666fe261e263e3_userenv.dll_1a3a70b6 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_tr-tr_7b26e497051a09da_comdlg32.dll.mui_ac8e62f4 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_en-us_f39c285e7fbf22f0_scardsvr.dll.mui_5f6fb64f sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-uxtheme.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6d057f90b91b6b1f_uxtheme.dll.mui_15ce9297 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-truetype-shruti_31bf3856ad364e35_6.1.7600.16385_none_295c980d6b8c1975_shruti.ttf_c4dbca5d sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_6.1.7600.16385_en-us_30bc7fe1e159c5d3_winmgmtr.dll.mui_741bfb68 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-rasbase.resources_31bf3856ad364e35_6.1.7600.16385_de-de_1b70574614d51987_kmddsp.tsp.mui_80ddeedb sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..structure.resources_31bf3856ad364e35_6.1.7600.16385_es-es_f7c9fbadf81b5982_sdbinst.exe.mui_258ad624 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_6.1.7600.16385_en-us_541d3a4db051d913.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e0ac3a3491076c7a_dhcpcore.dll.mui_8b901fc3 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-commonlog_31bf3856ad364e35_6.1.7600.16385_none_da778c54413d0c9c.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..sition-coreservices_31bf3856ad364e35_6.1.7601.17514_none_90ba4080c9f2e648.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7600.16385_de-de_227521a01b1e0f11_unlodctr.exe.mui_53acc4d0 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-credui.resources_31bf3856ad364e35_6.1.7601.17514_en-us_64222f560083ded6.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-shacct_31bf3856ad364e35_6.1.7601.17514_none_242839193814d663.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..irectdraw.resources_31bf3856ad364e35_6.1.7600.16385_es-es_6e56f850ce61b104.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_cs-cz_05d30e9dd60825a9.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_lt-lt_bf2eaae65ee1141a_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_networking-mpssvc-svc.resources_31bf3856ad364e35_6.1.7601.17514_es-es_893b7b01ece13650_firewallapi.dll.mui_43c7a05b sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_6.1.7600.16385_none_df4bbe8e10903104_vgasyse.fon_af851b69 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7d4fb966f596fd1d.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..ontroller.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_f4c280f4fcec33c8_services.exe.mui_86ea5e71 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-user32.resources_31bf3856ad364e35_6.1.7601.17514_fr-fr_3ea6d01c34b5cc55.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..per-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_61a5ca31abb6a8fd_wship6.dll.mui_1cca9bd8 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-rasbase_31bf3856ad364e35_6.1.7601.17514_none_765b17a2c56f9155_rasmxs.dll_0c54a828 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-sens-service_31bf3856ad364e35_6.1.7600.16385_none_2202c8fb0d092cab.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..ce-router.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_f6ea0fa9e9820bd7_activeds.dll.mui_67414db4 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-a..on-authui.resources_31bf3856ad364e35_6.1.7600.16385_es-es_e73ce5f9b6e1733a.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-halftone-ui.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_b5470469869088f3_htui.dll.mui_038c60dd sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_de-de_a0388400ce247642_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_6.1.7601.17514_none_3899b0ad2bb77a86_iscsied.dll_e933fb0e sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_57ee6a4218527f7e_dhcpcsvc.dll.mui_186571e1 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..pp-client.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_dba340d7365a2c01.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-sendmail.resources_31bf3856ad364e35_6.1.7600.16385_de-de_46584364f4c4d556.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_d33f52c4d452cdda_wmiutils.dll.mui_42583eaf sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_57eedf30d7fbfbdb_winlogon.exe.mui_3280fc46 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..es-interface-router_31bf3856ad364e35_6.1.7601.17514_none_59fd7093dccb4652_activeds.tlb_662648dd sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-homegroup-provsvc_31bf3856ad364e35_6.1.7601.17514_none_efe3724a04606825_provsvc.dll_a438d02f sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..-encoding.resources_31bf3856ad364e35_6.1.7600.16385_de-de_1ba89fdde0b7453a.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..core-base.resources_31bf3856ad364e35_6.1.7600.16385_es-es_69cd279a554d50be.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-dhcp-client-dll_31bf3856ad364e35_6.1.7601.17514_none_d961938b8cd1e885_dhcpclientdll.ptxml_6a7470ef sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_networking-mpssvc-svc.resources_31bf3856ad364e35_6.1.7601.17514_fr-fr_2bf2f100dfb34cb2.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-fixed_31bf3856ad364e35_6.1.7600.16385_none_db04d3f548508fd9_vgaf1256.fon_9bd7a63b sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mfc42x.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_c1197d6e9baee0fb_mfc42u.dll.mui_64d23330 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..e-ws2ifsl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8575a301e8975a22.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_6.1.7601.17514_es-es_28e9f3de1adcee20_winlogon.exe.mui_3280fc46 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7600.16385_es-es_cb31547d0a230c7b.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-legacyhwui.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_4f8ceabc4666dfe3_hdwwiz.exe.mui_b4acc7bc sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_uk-ua_0c40c3925a9ae4c4.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-ndis_31bf3856ad364e35_6.1.7601.17514_none_05ed313632ae9759.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..cardsubsystemclient_31bf3856ad364e35_6.1.7601.17514_none_770a7fb29038c2c0.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_de-de_a6c9ede9493e8861.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-security-spp.resources_31bf3856ad364e35_6.1.7600.16385_de-de_4fcc12c061ad9631.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_6.1.7600.16385_en-us_d28dabacfdb4dd1a_winload.exe.mui_3bc5b827 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-truetype-segoeui_31bf3856ad364e35_6.1.7600.16385_none_2cb0f5602bedb50f.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-webio.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_8c6fe68c0c8fba1a_webio.dll.mui_e805c4b7 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-efs-util-library_31bf3856ad364e35_6.1.7600.16385_none_46efb78b042229ec.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-searchfolder.resources_31bf3856ad364e35_6.1.7600.16385_en-us_7d2dc7126d5af514.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-oem_31bf3856ad364e35_6.1.7600.16385_none_59590e92c817a4e0_vga936.fon_11872ba5 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-dui70.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ec8cf7a93a7ed3ff_dui70.dll.mui_de5f27e2 sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_7e8b0c18f5629386.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_de-de_7f469506f7f6f97f.manifest sodinokibi.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-w..ure-other.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_dc840a10b75e8567.manifest sodinokibi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1376 vssadmin.exe -
Processes:
sodinokibi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 sodinokibi.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 sodinokibi.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
sodinokibi.exepid process 860 sodinokibi.exe 860 sodinokibi.exe 860 sodinokibi.exe 860 sodinokibi.exe 860 sodinokibi.exe 860 sodinokibi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1660 vssvc.exe Token: SeRestorePrivilege 1660 vssvc.exe Token: SeAuditPrivilege 1660 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
sodinokibi.execmd.exedescription pid process target process PID 860 wrote to memory of 872 860 sodinokibi.exe cmd.exe PID 860 wrote to memory of 872 860 sodinokibi.exe cmd.exe PID 860 wrote to memory of 872 860 sodinokibi.exe cmd.exe PID 860 wrote to memory of 872 860 sodinokibi.exe cmd.exe PID 872 wrote to memory of 1376 872 cmd.exe vssadmin.exe PID 872 wrote to memory of 1376 872 cmd.exe vssadmin.exe PID 872 wrote to memory of 1376 872 cmd.exe vssadmin.exe PID 872 wrote to memory of 1376 872 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/860-54-0x0000000076731000-0x0000000076733000-memory.dmpFilesize
8KB
-
memory/860-55-0x00000000021F0000-0x00000000022B9000-memory.dmpFilesize
804KB
-
memory/860-57-0x00000000022C0000-0x00000000023ED000-memory.dmpFilesize
1.2MB
-
memory/860-58-0x0000000000190000-0x00000000001AF000-memory.dmpFilesize
124KB
-
memory/860-59-0x0000000002700000-0x0000000002809000-memory.dmpFilesize
1.0MB
-
memory/860-60-0x00000000000E0000-0x00000000000EA000-memory.dmpFilesize
40KB
-
memory/860-61-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/860-62-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/860-64-0x0000000000160000-0x0000000000166000-memory.dmpFilesize
24KB
-
memory/860-63-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/872-65-0x0000000000000000-mapping.dmp
-
memory/1376-66-0x0000000000000000-mapping.dmp