Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 03:14
Behavioral task
behavioral1
Sample
850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117.dll
Resource
win10v2004-20220721-en
General
-
Target
850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117.dll
-
Size
164KB
-
MD5
70a0ec794a640530578d147fe1f3a60f
-
SHA1
8e393545acd5751edb42032be3e0b0e8c4eee2a4
-
SHA256
850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117
-
SHA512
2f81c8cd360d2653bf13c485ebd8e6eebfcc95bcae96e001deee310291c91877495144498c83f9efda31c6ce697d55d7ce80e98ae37e36e226bcee5aa39c73c7
Malware Config
Extracted
C:\o538rd-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ACA8B3DAA0FA92EC
http://decryptor.cc/ACA8B3DAA0FA92EC
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe -
Drops file in Program Files directory 34 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\program files\RedoCopy.nfo rundll32.exe File opened for modification \??\c:\program files\ResolveSend.pptm rundll32.exe File opened for modification \??\c:\program files\UpdateRequest.DVR rundll32.exe File opened for modification \??\c:\program files\ExpandLock.mov rundll32.exe File opened for modification \??\c:\program files\ResizeSelect.kix rundll32.exe File opened for modification \??\c:\program files\ResetFind.ods rundll32.exe File opened for modification \??\c:\program files\EnterApprove.ppsx rundll32.exe File opened for modification \??\c:\program files\InvokePop.jpg rundll32.exe File opened for modification \??\c:\program files\SwitchRedo.ADTS rundll32.exe File opened for modification \??\c:\program files\TraceConvertFrom.html rundll32.exe File opened for modification \??\c:\program files\ConfirmUndo.7z rundll32.exe File created \??\c:\program files (x86)\o538rd-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointLimit.odt rundll32.exe File opened for modification \??\c:\program files\EnableCompare.odt rundll32.exe File opened for modification \??\c:\program files\StartRestart.xps rundll32.exe File opened for modification \??\c:\program files\UnlockOpen.vst rundll32.exe File created \??\c:\program files\o538rd-readme.txt rundll32.exe File opened for modification \??\c:\program files\NewSubmit.mpeg rundll32.exe File opened for modification \??\c:\program files\RemoveDisconnect.mp2v rundll32.exe File opened for modification \??\c:\program files\ResumeSave.vdx rundll32.exe File opened for modification \??\c:\program files\SyncRequest.xlsb rundll32.exe File opened for modification \??\c:\program files\UnpublishSuspend.docx rundll32.exe File opened for modification \??\c:\program files\MoveResolve.cr2 rundll32.exe File opened for modification \??\c:\program files\MergeRestore.css rundll32.exe File opened for modification \??\c:\program files\RemoveUse.asf rundll32.exe File opened for modification \??\c:\program files\ConnectCheckpoint.tif rundll32.exe File opened for modification \??\c:\program files\FindExpand.dotx rundll32.exe File opened for modification \??\c:\program files\LockTrace.M2V rundll32.exe File opened for modification \??\c:\program files\SetSync.vsx rundll32.exe File opened for modification \??\c:\program files\UseRestart.crw rundll32.exe File opened for modification \??\c:\program files\DenyUnprotect.vssx rundll32.exe File opened for modification \??\c:\program files\DebugInvoke.css rundll32.exe File opened for modification \??\c:\program files\RestartLimit.ram rundll32.exe File opened for modification \??\c:\program files\AddHide.001 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 3372 rundll32.exe 3372 rundll32.exe 1796 powershell.exe 1796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 3372 rundll32.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeBackupPrivilege 1064 vssvc.exe Token: SeRestorePrivilege 1064 vssvc.exe Token: SeAuditPrivilege 1064 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4228 wrote to memory of 3372 4228 rundll32.exe rundll32.exe PID 4228 wrote to memory of 3372 4228 rundll32.exe rundll32.exe PID 4228 wrote to memory of 3372 4228 rundll32.exe rundll32.exe PID 3372 wrote to memory of 1796 3372 rundll32.exe powershell.exe PID 3372 wrote to memory of 1796 3372 rundll32.exe powershell.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\850b23e1ed71a675459cc210972ade5c86b1d7fc4f1c337de2a8c4d820883117.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2092
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1064