Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
sodinokibi.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
sodinokibi.exe
Resource
win10-en-20211208
General
-
Target
sodinokibi.exe
-
Size
143KB
-
MD5
a3749c66f65d247d8a6fae1be26d3ef9
-
SHA1
c394464bba56e62ddfe2c9073932fb656fb78b6c
-
SHA256
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c
-
SHA512
65bc1dba7e4de098e6b27b13b1e0723f703f645e4a4c6e53b7b03ec096a70d48ec2aca7e8bcd911ced61bab35e95983510604421ef35a593278414bfbb1cb01c
Malware Config
Extracted
C:\8mshyjy-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E9F42BAF7C9F0DCF
http://decryptor.top/E9F42BAF7C9F0DCF
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
sodinokibi.exedescription ioc process File renamed C:\Users\Admin\Pictures\RenameEnter.tiff => \??\c:\users\admin\pictures\RenameEnter.tiff.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\UnpublishUndo.crw => \??\c:\users\admin\pictures\UnpublishUndo.crw.8mshyjy sodinokibi.exe File opened for modification \??\c:\users\admin\pictures\PingUnpublish.tiff sodinokibi.exe File renamed C:\Users\Admin\Pictures\DenyEnable.tiff => \??\c:\users\admin\pictures\DenyEnable.tiff.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\NewFind.crw => \??\c:\users\admin\pictures\NewFind.crw.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\ResizeRestore.tif => \??\c:\users\admin\pictures\ResizeRestore.tif.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\SetWatch.raw => \??\c:\users\admin\pictures\SetWatch.raw.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\SyncCompare.crw => \??\c:\users\admin\pictures\SyncCompare.crw.8mshyjy sodinokibi.exe File opened for modification \??\c:\users\admin\pictures\DenyEnable.tiff sodinokibi.exe File opened for modification \??\c:\users\admin\pictures\RenameEnter.tiff sodinokibi.exe File renamed C:\Users\Admin\Pictures\ClearWatch.crw => \??\c:\users\admin\pictures\ClearWatch.crw.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\HideConvertTo.crw => \??\c:\users\admin\pictures\HideConvertTo.crw.8mshyjy sodinokibi.exe File renamed C:\Users\Admin\Pictures\PingUnpublish.tiff => \??\c:\users\admin\pictures\PingUnpublish.tiff.8mshyjy sodinokibi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
sodinokibi.exedescription ioc process File opened (read-only) \??\B: sodinokibi.exe File opened (read-only) \??\F: sodinokibi.exe File opened (read-only) \??\M: sodinokibi.exe File opened (read-only) \??\P: sodinokibi.exe File opened (read-only) \??\Q: sodinokibi.exe File opened (read-only) \??\K: sodinokibi.exe File opened (read-only) \??\L: sodinokibi.exe File opened (read-only) \??\N: sodinokibi.exe File opened (read-only) \??\R: sodinokibi.exe File opened (read-only) \??\T: sodinokibi.exe File opened (read-only) \??\V: sodinokibi.exe File opened (read-only) \??\X: sodinokibi.exe File opened (read-only) \??\A: sodinokibi.exe File opened (read-only) \??\G: sodinokibi.exe File opened (read-only) \??\H: sodinokibi.exe File opened (read-only) \??\Y: sodinokibi.exe File opened (read-only) \??\D: sodinokibi.exe File opened (read-only) \??\Z: sodinokibi.exe File opened (read-only) \??\E: sodinokibi.exe File opened (read-only) \??\I: sodinokibi.exe File opened (read-only) \??\J: sodinokibi.exe File opened (read-only) \??\O: sodinokibi.exe File opened (read-only) \??\S: sodinokibi.exe File opened (read-only) \??\U: sodinokibi.exe File opened (read-only) \??\W: sodinokibi.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
sodinokibi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\85o6aj9f8.bmp" sodinokibi.exe -
Drops file in Program Files directory 38 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification \??\c:\program files\ResizeRequest.raw sodinokibi.exe File opened for modification \??\c:\program files\UnprotectRevoke.js sodinokibi.exe File created \??\c:\program files (x86)\8mshyjy-readme.txt sodinokibi.exe File opened for modification \??\c:\program files\ProtectConvertFrom.jpeg sodinokibi.exe File opened for modification \??\c:\program files\DismountDisconnect.asp sodinokibi.exe File opened for modification \??\c:\program files\DismountRequest.inf sodinokibi.exe File opened for modification \??\c:\program files\WatchSearch.mov sodinokibi.exe File opened for modification \??\c:\program files\AddConnect.cfg sodinokibi.exe File opened for modification \??\c:\program files\AssertNew.mpeg2 sodinokibi.exe File opened for modification \??\c:\program files\WatchCompare.otf sodinokibi.exe File opened for modification \??\c:\program files\WatchSuspend.dwg sodinokibi.exe File opened for modification \??\c:\program files\DisableStop.ADTS sodinokibi.exe File opened for modification \??\c:\program files\SendUpdate.ttc sodinokibi.exe File opened for modification \??\c:\program files\StopUnblock.avi sodinokibi.exe File opened for modification \??\c:\program files\UseSplit.xml sodinokibi.exe File opened for modification \??\c:\program files\MergeStart.ADT sodinokibi.exe File opened for modification \??\c:\program files\SearchConvertTo.ppt sodinokibi.exe File opened for modification \??\c:\program files\ExitGroup.eprtx sodinokibi.exe File opened for modification \??\c:\program files\LimitDisable.vsw sodinokibi.exe File opened for modification \??\c:\program files\OutAssert.DVR-MS sodinokibi.exe File opened for modification \??\c:\program files\PingGet.au3 sodinokibi.exe File opened for modification \??\c:\program files\UnregisterRename.aif sodinokibi.exe File opened for modification \??\c:\program files\EnableStep.eps sodinokibi.exe File opened for modification \??\c:\program files\EnterJoin.odt sodinokibi.exe File opened for modification \??\c:\program files\RepairSkip.TS sodinokibi.exe File opened for modification \??\c:\program files\WriteRedo.dib sodinokibi.exe File created \??\c:\program files\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\GroupInvoke.ram sodinokibi.exe File opened for modification \??\c:\program files\LockStart.mhtml sodinokibi.exe File opened for modification \??\c:\program files\MoveUnprotect.DVR-MS sodinokibi.exe File opened for modification \??\c:\program files\ShowWait.mpeg3 sodinokibi.exe File created \??\c:\program files\8mshyjy-readme.txt sodinokibi.exe File opened for modification \??\c:\program files\CompareResolve.asf sodinokibi.exe File opened for modification \??\c:\program files\PublishImport.DVR sodinokibi.exe File opened for modification \??\c:\program files\ResizeInstall.xltm sodinokibi.exe File opened for modification \??\c:\program files\TestEnter.eps sodinokibi.exe File created \??\c:\program files (x86)\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\InitializeExpand.aif sodinokibi.exe -
Drops file in Windows directory 64 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..geservice.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_237c910efbe734b6.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-directui_31bf3856ad364e35_10.0.15063.0_none_d25e77385bc57ad6_windows.ui.xaml.resources.dll_3a1e5f1c sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_915abbd08935e3bf_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.15063.0_none_f5dc2ec982476ba8_iscsied.dll_e933fb0e sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_fi-fi_0d2d30b01649185b.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..temminpnp.resources_31bf3856ad364e35_10.0.15063.0_de-de_5a1742dfc8bd4040.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_hvgasys.fon_9f580ce4 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_8706117e54d521c4_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..-domain-clients-svc_31bf3856ad364e35_10.0.15063.0_none_5522510b24d3f7d4_polstore.mof_6cd3e826 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.15063.0_de-de_0a33dfb3366f64ad_vdsutil.dll.mui_0caf9b0e sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmpdui.resources_31bf3856ad364e35_10.0.15063.0_en-us_8ab04126569c4047.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-usermodensi_31bf3856ad364e35_10.0.15063.0_none_8dcaa66b34a35c05.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-usermodensi_31bf3856ad364e35_10.0.15063.0_none_8dcaa66b34a35c05_nsi.dll_e72df756 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..ype-segoeui_regular_31bf3856ad364e35_10.0.15063.0_none_859ed1f2d02a9db5_segoeui.ttf_b39275ad sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-advapi32_31bf3856ad364e35_10.0.15063.0_none_983d8f6006f300e2_advapi32.dll_9512793c sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..configurationengine_31bf3856ad364e35_10.0.15063.0_none_ca38bcecc16963b9_scesrv.dll_07b1e224 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-shsvcs.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_4b82fea50c102378.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_tr-tr_e7d5e490ab83d0c6.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-lsa-minwin_31bf3856ad364e35_10.0.15063.0_none_58d42528ff7de282_sspicli.dll_bcec1809 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_et-ee_ce022fe5aa8f10fb_bootmgr.exe.mui_c434701f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_sv-se_b993099aee9048c9.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_uk-ua_823ef85ec5aa50a3_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..-usermode.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_7a7b32b1837335e4_wudfsvc.dll.mui_e907fe77 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_8514syse.fon_d693946f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lddmcore_31bf3856ad364e35_10.0.15063.0_none_bcdc71d81c5b7ee4_dxgmms2.sys_9c8fa39d sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_1758c8aaa6a3ed16_dsreg.dll.mui_5d9efc7e sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_cs-cz_8efb8f901141355a_memtest.exe.mui_77b8cbcc sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_zh-cn_5b9d9831c6538b40.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_ru-ru_ea7ae6abda1aed80.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_pl-pl_c7457c7a32053978_memtest.efi.mui_71e15c22 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-fixed_31bf3856ad364e35_10.0.15063.0_none_9023bb87676e429a_vgafix.fon_8caf829c sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-t..nalservices-runtime_31bf3856ad364e35_10.0.15063.0_none_edf3c89e04cf9f63.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..n-cmdline.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_83341399f9512935.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.winhttp_31bf3856ad364e35_5.1.15063.0_none_722119dd79a37b23_winhttp.dll_6cd72d6e sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-com-base_31bf3856ad364e35_10.0.15063.0_none_1f020fb05f5437ab_wincorlib.dll_812daf53 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.15063.0_none_bae6f1b1935516b4_fontsub.dll_367a1189 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_10.0.15063.0_en-us_c3c95b73e48b1ae8_iscsiexe.dll.mui_7d81b1cc sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_f299a3aaa1d11a48_iscsiexe.dll.mui_7d81b1cc sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.winhttp.resources_31bf3856ad364e35_6.0.15063.0_fr-fr_062dd68942622861_winhttp.dll.mui_f661192f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..configurationengine_31bf3856ad364e35_10.0.15063.0_none_d48d673ef5ca25b4_scesrv.dll_07b1e224 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_ru-ru_b767e6d3720d3033.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_h8514sys.fon_9da56372 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_lv-lv_06be8d86c3187ada.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_j8514sys.fon_cfb116c0 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-pcw_31bf3856ad364e35_10.0.15063.0_none_c1256f978f4f2084_pcw.sys_dbeb0bbd sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasrtutils_31bf3856ad364e35_10.0.15063.0_none_1e296d4a23494905_rtutils.dll_243724ab sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-usermodensi.resources_31bf3856ad364e35_10.0.15063.0_es-es_5784f6984d299f85_nsisvc.dll.mui_237a741f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_ru-ru_111e484e14dfcb64.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-basesrv_31bf3856ad364e35_10.0.15063.0_none_1ddec40f1c898738_basesrv.dll_8c1ad808 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.15063.0_none_eb8784774de6a9ad_iscsicli.exe_20e14d4f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..-domain-clients-svc_31bf3856ad364e35_10.0.15063.0_none_5522510b24d3f7d4_ipsecsvc.mof_713662d2 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_9dfbb2b5abb61572_kmddsp.tsp.mui_80ddeedb sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ontroller.resources_31bf3856ad364e35_10.0.15063.0_en-us_7b1120505ec3e729_services.exe.mui_86ea5e71 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_es-es_74a152abb3d1d6b4_userdeviceregistration.ngc.dll.mui_d2c6ca95 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.15063.0_none_fd61363b291ec882.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-system-user-service_31bf3856ad364e35_10.0.15063.0_none_9c6c22cbabcb6847_usermgr.dll_015952d1 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_sr-..-rs_2ed8755544e099be.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-c..temminpnp.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_496c5037f236e2d6_umpnpmgr.dll.mui_d66aed17 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-basesrv_31bf3856ad364e35_10.0.15063.0_none_28336e6150ea4933.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_en-us_7f2aa019e80ba70a_userdeviceregistration.dll.mui_22ab8f29 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_hr-hr_78aafb7af9d71d92.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-win32kbase_31bf3856ad364e35_10.0.15063.0_none_bf8a1f019f8c15f7.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-appidcore.resources_31bf3856ad364e35_10.0.15063.0_es-es_748ca2e8b5fc36a2.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-ole-automation_31bf3856ad364e35_10.0.15063.0_none_d868ae1968a9ae8b.manifest sodinokibi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1936 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
sodinokibi.exepid process 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe 2724 sodinokibi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2264 vssvc.exe Token: SeRestorePrivilege 2264 vssvc.exe Token: SeAuditPrivilege 2264 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
sodinokibi.execmd.exedescription pid process target process PID 2724 wrote to memory of 844 2724 sodinokibi.exe cmd.exe PID 2724 wrote to memory of 844 2724 sodinokibi.exe cmd.exe PID 2724 wrote to memory of 844 2724 sodinokibi.exe cmd.exe PID 844 wrote to memory of 1936 844 cmd.exe vssadmin.exe PID 844 wrote to memory of 1936 844 cmd.exe vssadmin.exe PID 844 wrote to memory of 1936 844 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/844-120-0x0000000000000000-mapping.dmp
-
memory/1936-121-0x0000000000000000-mapping.dmp
-
memory/2724-115-0x0000000001570000-0x000000000157A000-memory.dmpFilesize
40KB
-
memory/2724-116-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2724-117-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2724-118-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/2724-119-0x0000000003170000-0x0000000003176000-memory.dmpFilesize
24KB