Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-01-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
6cf72f5fcd8496749d957f99e8b7489d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6cf72f5fcd8496749d957f99e8b7489d.exe
Resource
win10v2004-20231215-en
General
-
Target
6cf72f5fcd8496749d957f99e8b7489d.exe
-
Size
12.4MB
-
MD5
6cf72f5fcd8496749d957f99e8b7489d
-
SHA1
d1c46bad88255b82ff264f821bf3476f49f07fbd
-
SHA256
5edbbf6443f06a4c257794934ceccddef65cbc68fd0e779a11b1496ae9e51eeb
-
SHA512
1e80729c3e3aad324f24c2dc2381833ba8066b471b4f46f8bbce13f7cdea66adcd0a796ca072564a820feda0aa29ce0de45fcee2115ba0d13cfacbe0f7e481d2
-
SSDEEP
196608:0tObbMT9U95PXZYYFjsQ+YIs+GgALUMLKz5rETUQRUlMCBaKszvo7vsmYbG852K2:b95PX9uQ+dSez1+a9cfzveUmzzaN2
Malware Config
Extracted
C:\Users\r114f-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/74334F7798F6E8BC
http://decoder.re/74334F7798F6E8BC
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x00050000000191b0-427.dat family_babadeda -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2692 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 rimage.exe -
Loads dropped DLL 2 IoCs
pid Process 1884 6cf72f5fcd8496749d957f99e8b7489d.exe 2268 rimage.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\t32mMaunsR = "C:\\Users\\Admin\\AppData\\Roaming\\R-Tools Technology\\R-Drive Image\\rimage.exe" rimage.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: rimage.exe File opened (read-only) \??\U: rimage.exe File opened (read-only) \??\D: rimage.exe File opened (read-only) \??\E: rimage.exe File opened (read-only) \??\T: rimage.exe File opened (read-only) \??\W: rimage.exe File opened (read-only) \??\L: rimage.exe File opened (read-only) \??\Q: rimage.exe File opened (read-only) \??\X: rimage.exe File opened (read-only) \??\Y: rimage.exe File opened (read-only) \??\S: rimage.exe File opened (read-only) \??\A: rimage.exe File opened (read-only) \??\B: rimage.exe File opened (read-only) \??\K: rimage.exe File opened (read-only) \??\N: rimage.exe File opened (read-only) \??\I: rimage.exe File opened (read-only) \??\R: rimage.exe File opened (read-only) \??\V: rimage.exe File opened (read-only) \??\F: rimage.exe File opened (read-only) \??\O: rimage.exe File opened (read-only) \??\P: rimage.exe File opened (read-only) \??\Z: rimage.exe File opened (read-only) \??\G: rimage.exe File opened (read-only) \??\J: rimage.exe File opened (read-only) \??\M: rimage.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\234287.bmp" rimage.exe -
Drops file in Program Files directory 44 IoCs
description ioc Process File opened for modification \??\c:\program files\ConvertFromMove.ADT rimage.exe File opened for modification \??\c:\program files\GetSuspend.gif rimage.exe File opened for modification \??\c:\program files\RestartEnable.aif rimage.exe File opened for modification \??\c:\program files\UnregisterSuspend.vsx rimage.exe File opened for modification \??\c:\program files\CloseConvertFrom.emf rimage.exe File opened for modification \??\c:\program files\GetUndo.vsd rimage.exe File opened for modification \??\c:\program files\LimitJoin.xltx rimage.exe File opened for modification \??\c:\program files\UnregisterRestore.bmp rimage.exe File created \??\c:\program files\tmp rimage.exe File created \??\c:\program files\r114f-readme.txt rimage.exe File opened for modification \??\c:\program files\ExportInstall.odt rimage.exe File opened for modification \??\c:\program files\SuspendDismount.wax rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\tmp rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\r114f-readme.txt rimage.exe File opened for modification \??\c:\program files\AssertRename.mp4 rimage.exe File opened for modification \??\c:\program files\CompleteSwitch.midi rimage.exe File opened for modification \??\c:\program files\RepairMerge.dotm rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\tmp rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\r114f-readme.txt rimage.exe File opened for modification \??\c:\program files\ApproveClose.wma rimage.exe File opened for modification \??\c:\program files\ExpandExit.rar rimage.exe File opened for modification \??\c:\program files\MoveClose.aif rimage.exe File opened for modification \??\c:\program files\PopRestore.ps1xml rimage.exe File opened for modification \??\c:\program files\StepUnlock.asp rimage.exe File opened for modification \??\c:\program files\StopExpand.3gpp rimage.exe File opened for modification \??\c:\program files\CloseCompress.xlsm rimage.exe File opened for modification \??\c:\program files\ConnectWait.ps1xml rimage.exe File opened for modification \??\c:\program files\MeasureProtect.inf rimage.exe File opened for modification \??\c:\program files\MountConvert.mov rimage.exe File opened for modification \??\c:\program files\RestartMerge.easmx rimage.exe File opened for modification \??\c:\program files\StepBackup.mp4v rimage.exe File created \??\c:\program files (x86)\r114f-readme.txt rimage.exe File opened for modification \??\c:\program files\ApprovePing.wma rimage.exe File opened for modification \??\c:\program files\EnterDisable.mp4 rimage.exe File opened for modification \??\c:\program files\ImportPing.M2V rimage.exe File opened for modification \??\c:\program files\ReceiveApprove.mp3 rimage.exe File opened for modification \??\c:\program files\WatchHide.shtml rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\tmp rimage.exe File created \??\c:\program files (x86)\tmp rimage.exe File opened for modification \??\c:\program files\AddCheckpoint.sql rimage.exe File opened for modification \??\c:\program files\BackupExport.001 rimage.exe File opened for modification \??\c:\program files\RenameHide.cfg rimage.exe File opened for modification \??\c:\program files\ResetMeasure.ppsm rimage.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\r114f-readme.txt rimage.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2268 rimage.exe 2268 rimage.exe 2268 rimage.exe 2268 rimage.exe 2268 rimage.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2268 rimage.exe Token: SeTakeOwnershipPrivilege 2268 rimage.exe Token: SeBackupPrivilege 2252 vssvc.exe Token: SeRestorePrivilege 2252 vssvc.exe Token: SeAuditPrivilege 2252 vssvc.exe Token: SeBackupPrivilege 2492 vssvc.exe Token: SeRestorePrivilege 2492 vssvc.exe Token: SeAuditPrivilege 2492 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2268 rimage.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2268 1884 6cf72f5fcd8496749d957f99e8b7489d.exe 28 PID 1884 wrote to memory of 2268 1884 6cf72f5fcd8496749d957f99e8b7489d.exe 28 PID 1884 wrote to memory of 2268 1884 6cf72f5fcd8496749d957f99e8b7489d.exe 28 PID 1884 wrote to memory of 2268 1884 6cf72f5fcd8496749d957f99e8b7489d.exe 28 PID 2268 wrote to memory of 2692 2268 rimage.exe 32 PID 2268 wrote to memory of 2692 2268 rimage.exe 32 PID 2268 wrote to memory of 2692 2268 rimage.exe 32 PID 2268 wrote to memory of 2692 2268 rimage.exe 32 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cf72f5fcd8496749d957f99e8b7489d.exe"C:\Users\Admin\AppData\Local\Temp\6cf72f5fcd8496749d957f99e8b7489d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Roaming\R-Tools Technology\R-Drive Image\rimage.exe"C:\Users\Admin\AppData\Roaming\R-Tools Technology\R-Drive Image\rimage.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes3⤵
- Modifies Windows Firewall
PID:2692
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1604
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD564edeea9d5b5bbe49b4c22666353ee60
SHA1b312e5785ea31da217f1858820555856e4393466
SHA2567cb61a6fbdab9246b7ea368895a4cd928da5d3c61371cf14f3ac2fe39402f9db
SHA51234189dfd28ec90e52f5ef4a6e92ee75b8af7ae04b9592324dcce740fdfa2652e5bdf0dccc712d5922322358f518375d0e70ae394045b0bdb7567ad97839e4ab4
-
Filesize
297KB
MD53f517c15e8b924be1ab285723de6fbf9
SHA1a89c94cddd6247805b62314bf5f93b0ef0e24b4d
SHA256b53e6b3f1308152656ba75fa329264364d52f86dc0b21992f0441831231de1b5
SHA51245156505decd0cd53dc9bf2575717e566fdc7ed239ec2d1233ac629f56b228795949bdae5533e3ec42b96fb1c5ae503133d6a32dba08a9e8744a0a3c59615af6
-
Filesize
1.0MB
MD549186898dca05292964da2db3eb23b90
SHA1b29a90983485462127ada8db02bdb2cb862d95a5
SHA256bfcfdf1f04335ad9e99697d7c3cf5f5ebf261dbea68d892f642c1547e3862ab3
SHA512813450c9ec94b131816f7aecf105b46f31a70b9f2c69bf5132ca2586eaf138ea90eacb686a96a0a6e5b42b3534b052ea2d334aeb08a0b440337be1cb09643692
-
Filesize
1.3MB
MD5a8c922bc3e540279effd3f7412a83c30
SHA1b1f26c253a72af772063b6c910c053fe6c8dd2ad
SHA256875bedb03db4f4ae6b70108f4cdce4e783ceaa2b3eff86b1299992be7ec3ab7f
SHA51205670248530198d43f5df0e3f916410e0fc77838c0008440cc2ed0128041b51fe52486694af58be276ae812a96d2d0d72f23a23b5c39d808369f64a32bc028ad
-
Filesize
904KB
MD55a68fd557132bcbf3f9bb80124b84d42
SHA1fd466abe54eef900288a7dc306df1bca4d378adb
SHA256324d933119931529d77e9517f4e5634dc4d4289ddeccf89051a7451cc0bd27a0
SHA512a89fec0dda2ec7b28917fb136df7ed7e9e4802eafafa7f78e152f8ccb15cc6503b1729ce59f346a4fa8173d0bb9606d11d47d01908872c57cb9fe1b0bdf7fc33
-
Filesize
6KB
MD537d5ab65c80b0f454a8069114eed7f51
SHA142ca02f25b402ff48c526edb91eb192ffb72eac5
SHA2565a22c6d02cee6c116bfe198b82eed0bedcce40cd998efde538b21268c6a453fb
SHA51290238cd1502e2f9ab8b8f1605eb8b6167786238d906f7d55b84b4f17e6991c3aa0a79515679370a6727422f12661dcffcbb338dac0f8c9513b33253ed4cacea6
-
Filesize
881KB
MD555a168591b68d1b1fa8af89afa4c81a5
SHA131db0c6178cf09710ddb9bfc5e1f15584b7cf401
SHA25625449d5ff157eee41449559913721f1a23a7ca4fc427f141a4adc5b0a473d112
SHA51229795bffff93b57e37971af5239efad6d7007ca30ec94499681a5e2c192626cc6cf7ec49b096ef30b5cb910ea30d6df9d007c2259afca97fa921ad771f7de11b
-
Filesize
1.1MB
MD5f382cc5361fde9d0155cb417f1fd08ea
SHA1da046912f69fa7cc8e517bc4d1782656c84fd601
SHA25663ce6b191ff646ecb295c6018665c663e8253a58bb933f11ce66be6afc4d442c
SHA5123753ee46865ec536e4915389ca5194768719e4e915b06b9ba1721eb2b55d4216053ade2a4fb4b43013f1bb6e62ab7f8ced7ff917c84872a03d972b5cbffa4324