Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb.dll
Resource
win10v2004-20220414-en
General
-
Target
179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb.dll
-
Size
164KB
-
MD5
7884310d206832b741442ced3d68f715
-
SHA1
170abc4a8b7949619503b92a9e298f4d0130faf7
-
SHA256
179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb
-
SHA512
1260df2327421a1673c0c85d1f67aa9c42efc5bc9e6e7c4403b1f2e88ad6d147187f67a1f9a732cb03943b8681065928e9e8c5c7eb220eb1b0573bdef4058f19
Malware Config
Extracted
C:\how to decrypt 3qj76u89f-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/120BFD950B613162
http://decryptor.top/120BFD950B613162
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rundll32.exedescription ioc process File renamed C:\Users\Admin\Pictures\EditResize.raw => \??\c:\users\admin\pictures\EditResize.raw.3qj76u89f rundll32.exe File renamed C:\Users\Admin\Pictures\RedoDeny.raw => \??\c:\users\admin\pictures\RedoDeny.raw.3qj76u89f rundll32.exe File opened for modification \??\c:\users\admin\pictures\CheckpointExit.tiff rundll32.exe File opened for modification \??\c:\users\admin\pictures\SplitUpdate.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\CheckpointExit.tiff => \??\c:\users\admin\pictures\CheckpointExit.tiff.3qj76u89f rundll32.exe File renamed C:\Users\Admin\Pictures\SplitUpdate.tiff => \??\c:\users\admin\pictures\SplitUpdate.tiff.3qj76u89f rundll32.exe File renamed C:\Users\Admin\Pictures\BackupPublish.tif => \??\c:\users\admin\pictures\BackupPublish.tif.3qj76u89f rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Drops file in Program Files directory 13 IoCs
Processes:
rundll32.exedescription ioc process File created \??\c:\program files\how to decrypt 3qj76u89f-readme.txt rundll32.exe File created \??\c:\program files (x86)\how to decrypt 3qj76u89f-readme.txt rundll32.exe File opened for modification \??\c:\program files\OptimizeTest.dxf rundll32.exe File opened for modification \??\c:\program files\RegisterUninstall.js rundll32.exe File opened for modification \??\c:\program files\RevokeGrant.aiff rundll32.exe File opened for modification \??\c:\program files\SwitchSave.ini rundll32.exe File opened for modification \??\c:\program files\TestSend.mpeg3 rundll32.exe File opened for modification \??\c:\program files\TraceRevoke.3gpp rundll32.exe File opened for modification \??\c:\program files\ExitNew.xlsm rundll32.exe File opened for modification \??\c:\program files\RestartTest.WTV rundll32.exe File opened for modification \??\c:\program files\SendConfirm.aifc rundll32.exe File opened for modification \??\c:\program files\SyncMerge.ppt rundll32.exe File opened for modification \??\c:\program files\UseClose.emf rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 5008 rundll32.exe 5008 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4764 wrote to memory of 5008 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 5008 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 5008 4764 rundll32.exe rundll32.exe PID 5008 wrote to memory of 5116 5008 rundll32.exe cmd.exe PID 5008 wrote to memory of 5116 5008 rundll32.exe cmd.exe PID 5008 wrote to memory of 5116 5008 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\179294396c8a1184eb51d34fafa10ef55607db6322be41b83741a12a7b7095eb.dll,#12⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:5116
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4752