Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-07-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
048.exe
Resource
win10v2004-20220414-en
General
-
Target
048.exe
-
Size
404KB
-
MD5
0404a9cae8cfa9d41af806cae65498da
-
SHA1
8cd0d5b397e6ce5747bd37fdeb877e95601488f0
-
SHA256
fb872a27ca16a1c14f58076a0a29fb3166d0bac9643b3ab49aad3f29f6927256
-
SHA512
637455e998cb9964d35d05dce65cfaa06e992ad16aa8f4293b59c66d9a61bb26a0260f2afe14f746d440a7e2c19fb057117fe4c5831841e3c608f97df8ec9ff3
Malware Config
Extracted
C:\odt\54vch88v0w-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B573CE234FF30A23
http://decryptor.top/B573CE234FF30A23
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
048.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\SwitchDismount.tiff 048.exe File opened for modification C:\Users\Admin\Pictures\UnlockUse.tiff 048.exe File renamed C:\Users\Admin\Pictures\RenameRead.raw => C:\Users\Admin\Pictures\RenameRead.raw.54vch88v0w 048.exe File renamed C:\Users\Admin\Pictures\SearchGroup.tif => C:\Users\Admin\Pictures\SearchGroup.tif.54vch88v0w 048.exe File renamed C:\Users\Admin\Pictures\SubmitCompare.raw => C:\Users\Admin\Pictures\SubmitCompare.raw.54vch88v0w 048.exe File renamed C:\Users\Admin\Pictures\SuspendResolve.tif => C:\Users\Admin\Pictures\SuspendResolve.tif.54vch88v0w 048.exe File renamed C:\Users\Admin\Pictures\UnlockUse.tiff => C:\Users\Admin\Pictures\UnlockUse.tiff.54vch88v0w 048.exe File renamed C:\Users\Admin\Pictures\SwitchDismount.tiff => C:\Users\Admin\Pictures\SwitchDismount.tiff.54vch88v0w 048.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
048.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
048.exedescription ioc process File opened (read-only) \??\D: 048.exe File opened (read-only) \??\A: 048.exe File opened (read-only) \??\G: 048.exe File opened (read-only) \??\I: 048.exe File opened (read-only) \??\M: 048.exe File opened (read-only) \??\R: 048.exe File opened (read-only) \??\S: 048.exe File opened (read-only) \??\V: 048.exe File opened (read-only) \??\B: 048.exe File opened (read-only) \??\F: 048.exe File opened (read-only) \??\N: 048.exe File opened (read-only) \??\U: 048.exe File opened (read-only) \??\X: 048.exe File opened (read-only) \??\Y: 048.exe File opened (read-only) \??\Z: 048.exe File opened (read-only) \??\E: 048.exe File opened (read-only) \??\J: 048.exe File opened (read-only) \??\L: 048.exe File opened (read-only) \??\O: 048.exe File opened (read-only) \??\W: 048.exe File opened (read-only) \??\H: 048.exe File opened (read-only) \??\K: 048.exe File opened (read-only) \??\P: 048.exe File opened (read-only) \??\Q: 048.exe File opened (read-only) \??\T: 048.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
048.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1b3q75.bmp" 048.exe -
Drops file in Windows directory 64 IoCs
Processes:
048.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_10.0.19041.1_es-es_c81525929a05b49e.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_ega40869.fon_5e8f5479 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-netbt-minwin_31bf3856ad364e35_10.0.19041.572_none_c981575636cafecc_netbt.sys_9226f314 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winsock-core.resources_31bf3856ad364e35_10.0.19041.1_en-us_01d9cddf1dc42162.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_fi-fi_002b04f15e757967_comctl32.dll.mui_0da4e682 048.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1023_ja-jp_ed3ea94a706110ba_comctl32.dll.mui_0da4e682 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..orkconnectionbroker_31bf3856ad364e35_10.0.19041.1202_none_d16f7d1b7a182564_ncbservice.dll_f9d3de7a 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_d88727f57b0f135a.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..gon-tools.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_fa6de64bee57aebd_wlrmdr.exe.mui_ee563c83 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..e-ws2ifsl.resources_31bf3856ad364e35_10.0.19041.1_es-es_df71bede6e43d9f6.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winlogon-ext_31bf3856ad364e35_10.0.19041.1_none_3990ef4a132546c8.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.19041.1_it-it_ad9e9ef8adfd68d5.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-usermodepowerservice_31bf3856ad364e35_10.0.19041.1023_none_d2e23d980197bef4_umpo.dll_d1843b37 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..sition-coreservices_31bf3856ad364e35_10.0.19041.450_none_107cae8412302d3e_wiatrace.dll_dfb4e972 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_nb-no_ef95a8811026671c_bootmgfw.efi.mui_a6e78cfa 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.19041.1_en-us_2c89c78983615cee_winresume.efi.mui_f412814e 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_22bf4d8487c0bfe8.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_fr-fr_6de3ffe5662417e0_comctl32.dll.mui_0da4e682 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_sv-se_51f6670d7297a2d2.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-oem_31bf3856ad364e35_10.0.19041.1_none_b3552a6f4dc424b4_8514oemr.fon_dbe7e3dc 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..geservice.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_54a73aad2cc2f922_storagesense.adml_0fc60f43 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-themeservice.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_4629a3a74f53937a_themeservice.dll.mui_9e71f1ab 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..nfrastructure-ws232_31bf3856ad364e35_10.0.19041.546_none_d0b0f7c32d25503b.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-onecore-pnp-drvinst_31bf3856ad364e35_10.0.19041.1202_none_ca1e0a7a1f21274c.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_it-it_03d9d86028f54c50.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-partitionmanager_31bf3856ad364e35_10.0.19041.1110_none_56683e3b6f9cb252_partmgr.sys_fcac898c 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_b8b9693c8ab3775e.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_en-us_34c90260884a74ea_bootmgfw.efi.mui_a6e78cfa 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_sr-..-rs_c247a8be44151ccf_bootmgr.efi.mui_be5d0075 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.19041.1_none_9064b8c1b47576c0_iscsicli.exe.mun_64c0a241 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-null_31bf3856ad364e35_10.0.19041.1_none_5f56fb00ba5a9142_null.sys_e821cef0 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_9671d830bd73c88f_user32.dll.mui_14652dbb 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_2d3b6ea159ff4dae.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmilib_31bf3856ad364e35_10.0.19041.1_none_0f4607daa38a37c5.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_ar-sa_36c18982ae2885f9.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_9ac3a4c37bcb89fa.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appidcore.resources_31bf3856ad364e35_10.0.19041.1_es-es_0f152ce0e82a41ba_applockercsp.dll.mui_d2a0df70 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_10.0.19041.1_de-de_d431d440f6bef2b0_rasauto.dll.mui_12fa2c50 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-networkbridge_31bf3856ad364e35_10.0.19041.1_none_bddafe5ea5731fa2.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-r..intmapper.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_430caa488be6f8ed_rpcepmap.dll.mui_349798e1 048.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_379018f38e600fa9_mofcomp.exe.mui_35badf56 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1023_nl-nl_2fcd1b9b27a6e45b.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.19041.1_it-it_a349f4a6799ca6da_listsvc.dll.mui_27f0fc85 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_428f67dbffd4ce03_axinstui.exe.mui_aea34130 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ne-client-overrides_31bf3856ad364e35_10.0.19041.1052_none_a74b8f64d78e3b2f_power.energyestimationengine.display.ppkg_44353cf6 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.19041.1_es-es_89b47de9cd9469a3.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_10.0.19041.1_de-de_1f58f2b5ab00b734.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-crypt32-dll_31bf3856ad364e35_10.0.19041.21_none_533343740bd8edcf.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ncrypt-dll_31bf3856ad364e35_10.0.19041.662_none_3bbdfd78507f28c7_ncrypt.dll_0f36c580 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-sens-service.resources_31bf3856ad364e35_10.0.19041.1_en-us_cb32f183c162bd4b.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wbiosrvc_31bf3856ad364e35_10.0.19041.1081_none_e07df81d711ca0d9.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.19041.1_de-de_6ace49ac53b0c2de.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_9baaad1ae7af9c30_memtest.efi.mui_71e15c22 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_ega80857.fon_608e9436 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-sens-service.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6db5c466b45bc552_sens.dll.mui_64739194 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-gaming-xbox..e-service-component_31bf3856ad364e35_10.0.19041.789_none_3136b8d712da0334.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1023_tr-tr_650dd7439c5150ec.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_en-us_950d46109b6707a2.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_sv-se_8e0ddc60c5dec4a0_comctl32.dll.mui_0da4e682 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_lv-lv_ab9bc1d129a747ed.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..ndactivitymoderator_31bf3856ad364e35_10.0.19041.1_none_8b4593ccb753f4e5_bam.sys_038ac9a7 048.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_ja-jp_d7c2226e3af6bdfe.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_de-de_0528803147204d22.manifest 048.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-keyiso.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62fee1a8066741a1_keyiso.dll.mui_4bbf12ff 048.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
048.exepid process 2384 048.exe 2384 048.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
048.exedescription pid process target process PID 2384 wrote to memory of 1164 2384 048.exe cmd.exe PID 2384 wrote to memory of 1164 2384 048.exe cmd.exe PID 2384 wrote to memory of 1164 2384 048.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\048.exe"C:\Users\Admin\AppData\Local\Temp\048.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:1164