Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86.dll
Resource
win10v2004-20220414-en
General
-
Target
11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86.dll
-
Size
161KB
-
MD5
43031369548c3e6738d34b1cae9ef384
-
SHA1
d95e7d6e64ed6df508eac2ae271e3b46ad92fa40
-
SHA256
11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86
-
SHA512
01bfdd50f9893306c2864ed33e84332fce6555d6077d8dfbe7a0cf670c9da301ebdb260b7da690ae591d6c8b2a0aa3dc215bd36b9dc7a2dd00d6a6dd3d1e53a9
Malware Config
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\X: rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4356 rundll32.exe 4356 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4492 wrote to memory of 4356 4492 rundll32.exe rundll32.exe PID 4492 wrote to memory of 4356 4492 rundll32.exe rundll32.exe PID 4492 wrote to memory of 4356 4492 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11bfa9bc7563e823048440233143c0d56894dee97d4de9d3218e4f98a4b05c86.dll,#12⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4356