Analysis
-
max time kernel
168s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 02:02
Static task
static1
Behavioral task
behavioral1
Sample
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe
Resource
win10-en-20211208
General
-
Target
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe
-
Size
165KB
-
MD5
b6fcb19eb3bcbf3eaf16c7bf3f134d61
-
SHA1
6211ba0a1160b344c1740654b636a8fdd775fbd8
-
SHA256
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac
-
SHA512
8f6ed156e2d55dabc35a6012f5bbc8ce0bc031c7430e814d21f0d6d8d2ccf53e6ae4408c604359e2e4a37ca830d9a61efdf9422e9f4f3183c7c466b00d2bd020
Malware Config
Extracted
C:\How to decrypt 3471c9-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5715AC98096B14C6
http://decryptor.top/5715AC98096B14C6
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exedescription ioc process File opened for modification \??\c:\users\admin\pictures\ClearClose.tiff 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\CheckpointUndo.tiff => \??\c:\users\admin\pictures\CheckpointUndo.tiff.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\GetProtect.crw => \??\c:\users\admin\pictures\GetProtect.crw.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\MergeRename.tif => \??\c:\users\admin\pictures\MergeRename.tif.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\SuspendStep.png => \??\c:\users\admin\pictures\SuspendStep.png.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\UnprotectProtect.crw => \??\c:\users\admin\pictures\UnprotectProtect.crw.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\RequestMeasure.crw => \??\c:\users\admin\pictures\RequestMeasure.crw.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\users\admin\pictures\CheckpointUndo.tiff 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\ClearClose.tiff => \??\c:\users\admin\pictures\ClearClose.tiff.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\OptimizeCopy.png => \??\c:\users\admin\pictures\OptimizeCopy.png.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\PopResolve.raw => \??\c:\users\admin\pictures\PopResolve.raw.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File renamed C:\Users\Admin\Pictures\ResumeUnprotect.raw => \??\c:\users\admin\pictures\ResumeUnprotect.raw.3471c9 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\L2mKLMcNmB = "C:\\Users\\Admin\\AppData\\Local\\Temp\\58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe" 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exedescription ioc process File opened (read-only) \??\W: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\O: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\P: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\S: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\T: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\U: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\F: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\G: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\I: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\X: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\Q: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\V: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\Y: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\B: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\E: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\H: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\K: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\L: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\Z: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\A: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\J: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\M: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\N: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened (read-only) \??\R: 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe -
Drops file in Program Files directory 38 IoCs
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exedescription ioc process File opened for modification \??\c:\program files\HideSearch.jtx 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\WatchExport.pptm 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\WriteFind.tiff 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\AssertUse.pdf 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ConvertToEnable.svgz 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ExpandExport.scf 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\CompareWait.pptx 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ExpandSync.bmp 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\UnlockWait.jpeg 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\MountEnter.docm 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\MoveMerge.wav 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\PingInitialize.txt 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\RegisterUnlock.odt 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ResizeConfirm.ex_ 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\AddGet.mpeg3 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\DebugRegister.M2TS 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\FindUnpublish.rle 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ResumeClear.jpg 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\StepRedo.scf 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\SearchCopy.contact 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\FormatJoin.ini 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\GetSave.svgz 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ResetSwitch.mp4v 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\StartUse.vsx 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\StopTest.xlsx 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\TraceInvoke.tiff 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File created \??\c:\program files (x86)\How to decrypt 3471c9-readme.txt 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\EnableFind.mp4 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\MergeDismount.mhtml 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\BackupMerge.xltm 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\ExitSearch.mpv2 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\UndoOut.midi 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File created \??\c:\program files\How to decrypt 3471c9-readme.txt 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\FindStart.i64 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\LockSwitch.otf 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\GroupMerge.iso 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\UnblockTest.edrwx 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe File opened for modification \??\c:\program files\UnprotectRequest.xhtml 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exepowershell.exepid process 1372 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe 1372 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe 1576 powershell.exe 1576 powershell.exe 1576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1576 powershell.exe Token: SeBackupPrivilege 3800 vssvc.exe Token: SeRestorePrivilege 3800 vssvc.exe Token: SeAuditPrivilege 3800 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exedescription pid process target process PID 1372 wrote to memory of 1576 1372 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe powershell.exe PID 1372 wrote to memory of 1576 1372 58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe"C:\Users\Admin\AppData\Local\Temp\58cf92a67428816faa2f2ff2778ecfd8b129deb94b1a2ef1cbb3c13f665ffdac.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1576-123-0x000001FD567D0000-0x000001FD567F2000-memory.dmpFilesize
136KB
-
memory/1576-127-0x000001FD56980000-0x000001FD569F6000-memory.dmpFilesize
472KB
-
memory/1576-134-0x000001FD3C6A0000-0x000001FD547D0000-memory.dmpFilesize
385.2MB
-
memory/1576-135-0x000001FD3C6A0000-0x000001FD547D0000-memory.dmpFilesize
385.2MB