Malware Analysis Report

2025-01-18 19:11

Sample ID 220130-jsr3gshafp
Target 23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7
SHA256 23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7
Tags
$2a$12$ejwsoerkd6z8kjlxfcow0ocfwsbgp69qfdoi4wjdop5is6eojzizu 8489 sodinokibi evasion persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7

Threat Level: Known bad

The file 23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7 was found to be: Known bad.

Malicious Activity Summary

$2a$12$ejwsoerkd6z8kjlxfcow0ocfwsbgp69qfdoi4wjdop5is6eojzizu 8489 sodinokibi evasion persistence ransomware

Sodinokibi family

Sodin,Sodinokibi,REvil

Modifies extensions of user files

Modifies Windows Firewall

Enumerates connected drives

Adds Run key to start application

Sets desktop wallpaper using registry

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-30 07:56

Signatures

Sodinokibi family

sodinokibi

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-30 07:56

Reported

2022-01-30 13:08

Platform

win7-en-20211208

Max time kernel

120s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Modifies Windows Firewall

evasion

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\RevokeFind.crw => \??\c:\users\admin\pictures\RevokeFind.crw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\UndoNew.tif => \??\c:\users\admin\pictures\UndoNew.tif.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\CheckpointResume.crw => \??\c:\users\admin\pictures\CheckpointResume.crw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\ConvertFromSet.raw => \??\c:\users\admin\pictures\ConvertFromSet.raw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\CopyUndo.crw => \??\c:\users\admin\pictures\CopyUndo.crw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\DisableSplit.crw => \??\c:\users\admin\pictures\DisableSplit.crw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\JoinAdd.raw => \??\c:\users\admin\pictures\JoinAdd.raw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\CheckpointOpen.png => \??\c:\users\admin\pictures\CheckpointOpen.png.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\CompareImport.raw => \??\c:\users\admin\pictures\CompareImport.raw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\ConvertFromPing.crw => \??\c:\users\admin\pictures\ConvertFromPing.crw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\ReadWatch.raw => \??\c:\users\admin\pictures\ReadWatch.raw.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\SearchMove.png => \??\c:\users\admin\pictures\SearchMove.png.550f000z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bi2LJZNdn9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe" C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b8j8kjw30kfua.bmp" C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created \??\c:\program files (x86)\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\EditInitialize.mov C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\LockSet.cfg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\RestoreHide.iso C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\550f000z-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\550f000z-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\CompareClear.bmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\GroupMount.TTS C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConnectSend.asp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\OutCompress.mpg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\RequestDisable.potx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\RevokeSkip.snd C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\StepUnprotect.wmf C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\TracePublish.ps1xml C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files\550f000z-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\DebugPublish.tiff C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\EditUse.wpl C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\550f000z-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ApproveTrace.WTV C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\AssertCheckpoint.ogg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\BlockRevoke.wma C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConvertBlock.xml C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\DenyCompress.M2T C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\SuspendStop.avi C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConfirmSearch.rtf C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\MeasureJoin.dotx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ReceiveProtect.mp2 C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\SendMeasure.search-ms C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\UpdateDebug.dotx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\BlockGrant.dwfx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ExpandUninstall.vssx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\FormatEnable.csv C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ImportPublish.ogg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ResumeTest.mp3 C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConvertInstall.mpeg3 C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\TestWrite.7z C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\550f000z-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe

"C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe"

C:\Windows\SysWOW64\netsh.exe

netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes

C:\Windows\system32\wbem\unsecapp.exe

C:\Windows\system32\wbem\unsecapp.exe -Embedding

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

Network

N/A

Files

memory/1088-54-0x00000000751B1000-0x00000000751B3000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-30 07:56

Reported

2022-01-30 13:09

Platform

win10-en-20211208

Max time kernel

159s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Modifies Windows Firewall

evasion

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\LockResume.raw => \??\c:\users\admin\pictures\LockResume.raw.1elv3vsh C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\RequestRestart.raw => \??\c:\users\admin\pictures\RequestRestart.raw.1elv3vsh C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\RestartReset.tif => \??\c:\users\admin\pictures\RestartReset.tif.1elv3vsh C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\UnblockRemove.tif => \??\c:\users\admin\pictures\UnblockRemove.tif.1elv3vsh C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File renamed C:\Users\Admin\Pictures\DebugResolve.tif => \??\c:\users\admin\pictures\DebugResolve.tif.1elv3vsh C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bi2LJZNdn9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe" C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8g8o.bmp" C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification \??\c:\program files\SkipOpen.mpg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\WatchStart.rle C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\CheckpointSet.mpg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConvertFromConvertTo.mpeg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\NewRemove.3gp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\PingSelect.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\InvokeRestore.mht C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\JoinResume.wps C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\OutConvert.xltx C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\UnprotectSwitch.html C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\1elv3vsh-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConfirmExport.js C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\GetUndo.cr2 C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\UnprotectHide.ppsm C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\UnprotectResize.vb C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\WaitAdd.wmv C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files\1elv3vsh-readme.txt C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ConvertFromSave.mov C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\GrantProtect.mpeg3 C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\ResolveOpen.mpg C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\SaveBlock.ADT C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File created \??\c:\program files (x86)\tmp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\DismountStart.odp C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\InstallFind.mht C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
File opened for modification \??\c:\program files\RevokeDisable.wm C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rescache\_merged\3418783148\3128450559.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\1974107395\4149693858.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\1301087654\4010849688.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\1476457207\3533431084.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\2878165772\1123312451.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\81479705\3092222186.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\2483382631\828754195.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\4272278488\30062976.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\4185669309\1202008662.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\3623239459\11870838.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\423379043\3468251582.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\1601268389\1361672858.pri C:\Windows\SysWOW64\netsh.exe N/A
File created C:\Windows\rescache\_merged\4183903823\97717462.pri C:\Windows\SysWOW64\netsh.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe

"C:\Users\Admin\AppData\Local\Temp\23dfac36eb9bd2e433dfd9c456cbfe944b01628d922228a143f326356225a5d7.exe"

C:\Windows\SysWOW64\netsh.exe

netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes

C:\Windows\system32\wbem\unsecapp.exe

C:\Windows\system32\wbem\unsecapp.exe -Embedding

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

Network

Files

N/A