Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 00:12
Static task
static1
Behavioral task
behavioral1
Sample
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe
Resource
win10v2004-20220414-en
General
-
Target
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe
-
Size
179KB
-
MD5
6f6ac812f004bdb64d7f394f21c79767
-
SHA1
216bc112c323d367fc2c3736ab98a0948fee1171
-
SHA256
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46
-
SHA512
d7be9ac5ca022303dbab3d19acce03e811ff170a3b5b45b2e7951346c852b0b03e7fe4eb97fb0f47ed0d5e1c009f5375dde4a61b7d9de3f0a1ac1e254c231e03
Malware Config
Extracted
C:\eb42n2-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/26C5355B28288033
http://decryptor.top/26C5355B28288033
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription ioc process File renamed C:\Users\Admin\Pictures\AddDismount.tiff => \??\c:\users\admin\pictures\AddDismount.tiff.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\BackupSearch.tif => \??\c:\users\admin\pictures\BackupSearch.tif.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\ConvertToExpand.tif => \??\c:\users\admin\pictures\ConvertToExpand.tif.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\PopSwitch.tif => \??\c:\users\admin\pictures\PopSwitch.tif.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\SendReceive.png => \??\c:\users\admin\pictures\SendReceive.png.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\users\admin\pictures\AddDismount.tiff 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\CompareRedo.crw => \??\c:\users\admin\pictures\CompareRedo.crw.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\ConfirmInvoke.raw => \??\c:\users\admin\pictures\ConfirmInvoke.raw.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\DisableLimit.png => \??\c:\users\admin\pictures\DisableLimit.png.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File renamed C:\Users\Admin\Pictures\SendUndo.png => \??\c:\users\admin\pictures\SendUndo.png.eb42n2 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription ioc process File opened (read-only) \??\R: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\X: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\Z: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\D: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\Q: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\E: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\K: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\L: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\S: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\V: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\W: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\A: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\H: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\I: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\N: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\P: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\T: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\U: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\Y: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\B: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\G: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\J: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\M: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\O: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened (read-only) \??\F: 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Drops file in Program Files directory 20 IoCs
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription ioc process File opened for modification \??\c:\program files\UnpublishDeny.3gp 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\BackupEnter.wvx 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\ComparePop.mp2v 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\EnterNew.kix 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\RedoBlock.rtf 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\SearchCompress.docx 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\SelectGet.ps1 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\SuspendLimit.temp 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\ClearRename.DVR 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\ConvertConfirm.txt 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\StopApprove.ini 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File created \??\c:\program files\eb42n2-readme.txt 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File created \??\c:\program files (x86)\eb42n2-readme.txt 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\CompressCheckpoint.jpg 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\ConfirmRestore.ADT 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\ConvertToConvert.vdw 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\RenameAdd.ram 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\RestoreUnprotect.emz 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\MergeUndo.m3u 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification \??\c:\program files\SaveReceive.vsdx 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Drops file in Windows directory 64 IoCs
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-onecore-pnp-umpnpmgr.resources_31bf3856ad364e35_10.0.19041.1_de-de_72e27bc83918c47a.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_10.0.19041.1_es-es_ca3ca8d6defbef0d.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_zh-tw_984baa246cdd2b6c.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_da-dk_d112a4016e15fe6c_memtest.exe.mui_77b8cbcc 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase-raspptp_31bf3856ad364e35_10.0.19041.488_none_77bf24d746c4ccde.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_ko-kr_337ec84c18eb5c0e_comctl32.dll.mui_0da4e682 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_th-th_558750deac9dd31c_comctl32.dll.mui_0da4e682 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-lsa_31bf3856ad364e35_10.0.19041.546_none_8e987c14effb44a8_offlinelsa.dll_26ff60c5 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.1_pt-br_feaf34166ad1ed16.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smss-minwin_31bf3856ad364e35_10.0.19041.964_none_5c42846f47acb1a6.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-sxssrv_31bf3856ad364e35_10.0.19041.207_none_3eab5ab615eaf290_sxssrv.dll_4cd0c747 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_ro-ro_a7fd6f88bbbece6f.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_hu-hu_fd01b7045f001002.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_10.0.19041.1_es-es_029f7959ec5608b5.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..-netlogon.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_88376550b126b852.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-spp.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_f53bd778c93129d1_sppsvc.exe.mui_40875a72 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasbase-core_31bf3856ad364e35_10.0.19041.1_none_f22c316c97d7c109.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-kernelstreaming_31bf3856ad364e35_10.0.19041.630_none_357ed96df4b0aef0.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.19041.1_de-de_6b17c8d06620d760_kmddsp.tsp.mui_80ddeedb 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-msasn1_31bf3856ad364e35_10.0.19041.1_none_879fcda0791faba1.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_a35d6ad33b0c3e19.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.19041.1_de-de_6dae5583c093ad90.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_uk-ua_4f4fad6deb8a668a.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-msvcrt_31bf3856ad364e35_10.0.19041.1_none_874643a43e43a428.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver_31bf3856ad364e35_10.0.19041.1081_none_20871f311cebb1df.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_he-il_47e71de5429c9e8d_comctl32.dll.mui_0da4e682 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_ja-jp_fa31753930710f39.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-msxml60_31bf3856ad364e35_10.0.19041.1081_none_07a08c6e805601ea_msxml6.dll_ebe15265 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-cryptbase_31bf3856ad364e35_10.0.19041.546_none_4db3c6cb412a03a7_cryptbase.dll_83e36053 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..ependencyminifilter_31bf3856ad364e35_10.0.19041.928_none_0863e8efe63839e6.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.19041.1_de-de_ce34d3262165aa68_gpapi.dll.mui_ef0a9748 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-networkbridge_31bf3856ad364e35_10.0.19041.746_none_e5e33ba764e4ddec_bridgeres.dll_55e40455 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmpdui.resources_31bf3856ad364e35_10.0.19041.1_es-es_2f58d254bd51feff.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-defender-nis-service_31bf3856ad364e35_10.0.19041.1_none_d3e3ad84b24cfdfe_nissrv.exe_f967cd63 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.19041.1_none_d01fb68c391167d9.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1023_zh-cn_1df4cb819a3ceb6c_comctl32.dll.mui_0da4e682 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_b8b9693c8ab3775e_credprov2fahelper.dll.mui_71e4ecb5 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.19041.1_es-es_13d3fbad5525d4ca.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smbminirdr_31bf3856ad364e35_10.0.19041.1202_none_f4519a1f0653c6be.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.19041.1_it-it_e4acb32056072b0a.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_de-de_2c820146d670754b.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_et-ee_2e542ad48c77431e_bootmgr.efi.mui_be5d0075 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d2d_31bf3856ad364e35_10.0.19041.1_none_5d8df447fb4e7fad.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_app775.fon_dec57409 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_pt-br_ccfd6386dfdf0d78.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_es-es_76fa6c1a5ef15070_memtest.exe.mui_77b8cbcc 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_bg-bg_24aea1e2b3250056.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_cga80woa.fon_40965299 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.winhttp_31bf3856ad364e35_5.1.19041.1151_none_d57e154a0a8460d3_winhttp.dll_6cd72d6e 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.19041.1_it-it_84eb9b0a52fd6f78_clipsvc.dll.mui_18823613 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_nl-nl_25e65642b37198d7_memtest.efi.mui_71e15c22 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_tr-tr_c2f24ed0bf347cdd.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..cture-bsp.resources_31bf3856ad364e35_10.0.19041.1_es-es_839da6ed033a36cd_mswsock.dll.mui_d7c2a730 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.19041.1_none_3947da6a963cb0d8_svgasys.fon_32986711 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasserver_31bf3856ad364e35_10.0.19041.1081_none_2adbc983514c73da_iprtrmgr.dll_50f5fe79 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_ko-kr_496934220e812541_memtest.exe.mui_77b8cbcc 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_nl-nl_cc1a553810af34e6.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_sk-sk_0d829ab8038e261c_msimsg.dll.mui_72e8994f 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lsa.resources_31bf3856ad364e35_10.0.19041.1_de-de_93a80bdc471ad1dd.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-profsvc_31bf3856ad364e35_10.0.19041.1266_none_70772af2e7de61d2_profsvc.dll_a428cc3f 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_de-de_b853cd677a5689d3.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-d..opwindowmanager-api_31bf3856ad364e35_10.0.19041.746_none_c85cd9abd32d61b4_dwmapi.dll_2f4f8b34 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_lt-lt_ef598ca8aecfa1ed.manifest 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_fr-ca_ae0781067f78a70c_comctl32.dll.mui_0da4e682 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exepid process 3800 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe 3800 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exedescription pid process target process PID 3800 wrote to memory of 4728 3800 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe cmd.exe PID 3800 wrote to memory of 4728 3800 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe cmd.exe PID 3800 wrote to memory of 4728 3800 356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe"C:\Users\Admin\AppData\Local\Temp\356f917c96ae1460bd5e127f8917b23d7525352473bf91ae996c68b16c9f6a46.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:4728
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4892