Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 21:14
Behavioral task
behavioral1
Sample
bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll
Resource
win10v2004-20220721-en
General
-
Target
bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll
-
Size
164KB
-
MD5
f7f3fd2b59b0979bb7c8265122547f9a
-
SHA1
b8316833bd136d8b41422995fa590f44ce809067
-
SHA256
bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed
-
SHA512
0fca83351f1925db5626218c57087ff76e3a0dc0f1a5a5c54057d140c83c47136f0265ead345765aef4ef9d81d2ec4f4c8ec71f87f1ed1910bdc0c2ba2ac9d27
Malware Config
Extracted
C:\How to decrypt o608q-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64E737F5C0263001
http://decryptor.top/64E737F5C0263001
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\P: rundll32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created \??\c:\program files (x86)\How to decrypt o608q-readme.txt rundll32.exe File created \??\c:\program files\How to decrypt o608q-readme.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 4068 rundll32.exe 4068 rundll32.exe 1536 powershell.exe 1536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1536 powershell.exe Token: SeBackupPrivilege 3760 vssvc.exe Token: SeRestorePrivilege 3760 vssvc.exe Token: SeAuditPrivilege 3760 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4596 wrote to memory of 4068 4596 rundll32.exe rundll32.exe PID 4596 wrote to memory of 4068 4596 rundll32.exe rundll32.exe PID 4596 wrote to memory of 4068 4596 rundll32.exe rundll32.exe PID 4068 wrote to memory of 1536 4068 rundll32.exe powershell.exe PID 4068 wrote to memory of 1536 4068 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb7707d5672a409d7b69356ca1f2ed947bc5c76a683431c8b636e60845fa17ed.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4768
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3760