Analysis
-
max time kernel
167s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe
Resource
win10-en-20211208
General
-
Target
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe
-
Size
115KB
-
MD5
eac91fd727e02264e06be76d23d7b1d8
-
SHA1
0e1b850017812402b82c9c403e145a697a9d1462
-
SHA256
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248
-
SHA512
9942ed7c74fee157cb7cd87ff503374b26fb6c619c77a1c1d4e3b3b8facaee05975e03ef621816a86ee527aa727b8d56802d5d61460a02d12755991df5465ff9
Malware Config
Extracted
C:\37204vx-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E2E95C50E81A90DF
http://decryptor.cc/E2E95C50E81A90DF
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exedescription ioc process File renamed C:\Users\Admin\Pictures\LimitWait.tiff => \??\c:\users\admin\pictures\LimitWait.tiff.37204vx 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\pictures\LimitWait.tiff 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File renamed C:\Users\Admin\Pictures\ExitGroup.tif => \??\c:\users\admin\pictures\ExitGroup.tif.37204vx 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7THSMUAouJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe" 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe -
Drops desktop.ini file(s) 29 IoCs
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exedescription ioc process File opened for modification \??\c:\program files\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\videos\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\music\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\libraries\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu places\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\documents\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files (x86)\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\documents\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\downloads\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\pictures\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\links\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\onedrive\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\music\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\searches\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\videos\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\public\desktop\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exedescription ioc process File opened (read-only) \??\G: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\N: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\S: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\W: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\Y: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\A: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\B: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\E: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\J: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\L: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\O: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\P: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\Q: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\X: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\H: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\K: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\M: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\R: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\T: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\U: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\V: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\Z: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\F: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened (read-only) \??\I: 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe -
Drops file in Program Files directory 28 IoCs
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exedescription ioc process File created \??\c:\program files (x86)\37204vx-readme.txt 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ReceiveHide.dwfx 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\RevokeRepair.sql 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\WaitBlock.js 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\UninstallUpdate.ps1xml 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ApproveFind.xlsm 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ConvertExport.wm 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ResetGet.mp4 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\DisconnectUnpublish.mpa 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\FindSend.rle 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\InstallSwitch.rm 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ResizeFind.xlt 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\PopMerge.asf 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\RevokeConvert.aif 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ExpandComplete.3g2 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\MountUpdate.aifc 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\ResetDeny.3gpp 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\UnprotectDismount.au 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\UseTest.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files (x86)\desktop.ini 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\WriteMeasure.docx 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File created \??\c:\program files\37204vx-readme.txt 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\RegisterTrace.midi 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\TestUse.xlt 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\UnblockConvert.7z 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\SendUnlock.wm 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe File opened for modification \??\c:\program files\WaitWatch.mpeg 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe -
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Windows\rescache\_merged\2717123927\1253081315.pri explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3644 3044 WerFault.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe 3644 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exeWerFault.exeexplorer.exedescription pid process Token: SeTakeOwnershipPrivilege 3056 96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe Token: SeDebugPrivilege 3644 WerFault.exe Token: SeShutdownPrivilege 3824 explorer.exe Token: SeCreatePagefilePrivilege 3824 explorer.exe Token: SeShutdownPrivilege 3824 explorer.exe Token: SeCreatePagefilePrivilege 3824 explorer.exe Token: SeShutdownPrivilege 3824 explorer.exe Token: SeCreatePagefilePrivilege 3824 explorer.exe Token: SeShutdownPrivilege 3824 explorer.exe Token: SeCreatePagefilePrivilege 3824 explorer.exe Token: SeShutdownPrivilege 3824 explorer.exe Token: SeCreatePagefilePrivilege 3824 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
explorer.exepid process 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
explorer.exepid process 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe 3824 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe"C:\Users\Admin\AppData\Local\Temp\96a7ff0cff1bab41392844816d1277a9946fd1941ce160b8335321aed328d248.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3044 -s 22881⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000001.db.37204vxMD5
e4b00dac77fbf4bbbf200c73a107d5a8
SHA11a98b2913556fe438c9391d0294573a86a3b0eeb
SHA256df95c5703f68ac3e938c7aba50b3e723e09fb39f7e04aa629fce0be9697451d5
SHA512e7b3ed9b38dea605f14dfa6b1cb4af33afae5fbc72ea97c2aa1e575c9c0bcee3215fbfba9b7783a15fe46fe53e0ea06c0ee4726e26f2ec1792a9ce8f6d94f770
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.37204vxMD5
9dc0cb2180f0711dbc060085f2c34c30
SHA16dd98b32ce545efa880cb2a7d037998fc8e64618
SHA25625747a5d82a3a23f8d92ac92a6bacd6606f8c65f878ac8c64b9c0bfc78c64f25
SHA5126d183ada9335f842f6b8909aabe9a1a786f7cbc8e7e5fef6ace6bdfd7c96aa01eacd01209a58df498abb92ae8755b7bff11a3fd855e90d8bf85792c5ef897fdc