Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 12:48
Behavioral task
behavioral1
Sample
0c280ffb12537bca109724ec89d1ccc6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c280ffb12537bca109724ec89d1ccc6.exe
Resource
win10v2004-20231215-en
General
-
Target
0c280ffb12537bca109724ec89d1ccc6.exe
-
Size
179KB
-
MD5
0c280ffb12537bca109724ec89d1ccc6
-
SHA1
a8d5d8d5d1b8f288e919fe303787c5e1869ad653
-
SHA256
a728d45de941ca5730401f224c80fa1dcc2224477e309f5e4a1de8276939dfbf
-
SHA512
13c15edf4f022f74b3dd57cc203dc5a6bdde773a85ae83df772d536dd4c538ac11415a7c5d8fbb8b39e5e27c52d869a4b5cb19eb7c21c799e4bd8a53440b568a
-
SSDEEP
3072:yEa2d8CfSXceqmPDu4lPZU/CZtpysa8ustqzhy2Is80nwnyxVps:ACqlPDuGPG/abesYzg2I70nqoDs
Malware Config
Extracted
C:\Users\noc4675y-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/32232C0574C06CF3
http://decryptor.top/32232C0574C06CF3
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\X: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\Y: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\D: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\I: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\N: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\P: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\A: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\H: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\R: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\W: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\Z: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\G: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\M: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\Q: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\T: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\E: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\L: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\O: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\S: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\U: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\B: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\J: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\K: 0c280ffb12537bca109724ec89d1ccc6.exe File opened (read-only) \??\F: 0c280ffb12537bca109724ec89d1ccc6.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\u0484.bmp" 0c280ffb12537bca109724ec89d1ccc6.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created \??\c:\program files\noc4675y-readme.txt 0c280ffb12537bca109724ec89d1ccc6.exe File created \??\c:\program files (x86)\noc4675y-readme.txt 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\AddInvoke.dib 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\ApproveStop.wmv 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\RegisterCompress.docm 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\DisableEnable.DVR-MS 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\ExportGroup.AAC 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\GetRepair.svgz 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\HideSync.raw 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\TestSubmit.wps 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\CopyGroup.3gp 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\SearchPing.vsx 0c280ffb12537bca109724ec89d1ccc6.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\noc4675y-readme.txt 0c280ffb12537bca109724ec89d1ccc6.exe File opened for modification \??\c:\program files\BlockOpen.png 0c280ffb12537bca109724ec89d1ccc6.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\noc4675y-readme.txt 0c280ffb12537bca109724ec89d1ccc6.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\noc4675y-readme.txt 0c280ffb12537bca109724ec89d1ccc6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 0c280ffb12537bca109724ec89d1ccc6.exe 2720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe Token: SeBackupPrivilege 2572 vssvc.exe Token: SeRestorePrivilege 2572 vssvc.exe Token: SeAuditPrivilege 2572 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2720 2536 0c280ffb12537bca109724ec89d1ccc6.exe 29 PID 2536 wrote to memory of 2720 2536 0c280ffb12537bca109724ec89d1ccc6.exe 29 PID 2536 wrote to memory of 2720 2536 0c280ffb12537bca109724ec89d1ccc6.exe 29 PID 2536 wrote to memory of 2720 2536 0c280ffb12537bca109724ec89d1ccc6.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6.exe"C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2824
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56f7f0755bd4c5bc71d3a28cd4f22857b
SHA1413ce927b74f067b4f2af53d82985c1edd2746a1
SHA256b415ea0a65e36755a41c50304952f7deeb3d42b13803c4aca4dd2311f4cb712e
SHA512ce6107b408fc5a6e6aea67f442d3aae06f78506aaa6c97a723f42246b501a113b40052dae1bd3829ba2103c868adce1b8003e207ebdf6816f4c187bd3e0e7f07