Resubmissions
31-01-2025 15:30
250131-sxp85azjcz 1014-01-2025 05:35
250114-gaenbszqam 1010-01-2025 23:50
250110-3vv2pswmhj 1011-12-2024 15:19
241211-sqgcmssnbr 1009-12-2024 01:54
241209-cbqprsxngx 1026-11-2024 23:15
241126-28wpqa1ndp 1030-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 10Analysis
-
max time kernel
1802s -
max time network
1808s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
v2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
v2.exe
Resource
win10v2004-20240221-en
General
-
Target
v2.exe
-
Size
121KB
-
MD5
944ed18066724dc6ca3fb3d72e4b9bdf
-
SHA1
1a19c8793cd783a5bb89777f5bc09e580f97ce29
-
SHA256
74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f
-
SHA512
a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3
-
SSDEEP
1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY
Malware Config
Extracted
C:\ProgramData\e393rgycyf-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C30034AB31F9CD81
http://decoder.re/C30034AB31F9CD81
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\e393rgycyf-readme.txt v2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: v2.exe File opened (read-only) \??\K: v2.exe File opened (read-only) \??\S: v2.exe File opened (read-only) \??\J: v2.exe File opened (read-only) \??\V: v2.exe File opened (read-only) \??\W: v2.exe File opened (read-only) \??\Z: v2.exe File opened (read-only) \??\G: v2.exe File opened (read-only) \??\H: v2.exe File opened (read-only) \??\M: v2.exe File opened (read-only) \??\Y: v2.exe File opened (read-only) \??\I: v2.exe File opened (read-only) \??\L: v2.exe File opened (read-only) \??\O: v2.exe File opened (read-only) \??\T: v2.exe File opened (read-only) \??\F: v2.exe File opened (read-only) \??\A: v2.exe File opened (read-only) \??\N: v2.exe File opened (read-only) \??\R: v2.exe File opened (read-only) \??\X: v2.exe File opened (read-only) \??\Q: v2.exe File opened (read-only) \??\B: v2.exe File opened (read-only) \??\E: v2.exe File opened (read-only) \??\P: v2.exe File opened (read-only) \??\D: v2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 279 sites.google.com 280 sites.google.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\slij3a4a.bmp" v2.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created \??\c:\program files\e393rgycyf-readme.txt v2.exe File opened for modification \??\c:\program files\CompleteStop.au v2.exe File opened for modification \??\c:\program files\LockLimit.aifc v2.exe File opened for modification \??\c:\program files\SubmitInitialize.htm v2.exe File opened for modification \??\c:\program files\SyncLock.vstx v2.exe File opened for modification \??\c:\program files\UpdateRestart.vssx v2.exe File opened for modification \??\c:\program files\ExitDismount.xla v2.exe File opened for modification \??\c:\program files\SkipGroup.wma v2.exe File opened for modification \??\c:\program files\ClearSave.TS v2.exe File opened for modification \??\c:\program files\ConvertFromWatch.ppt v2.exe File opened for modification \??\c:\program files\DisableConvert.gif v2.exe File opened for modification \??\c:\program files\GetOut.jtx v2.exe File opened for modification \??\c:\program files\OptimizeDisconnect.inf v2.exe File opened for modification \??\c:\program files\ReadSearch.html v2.exe File opened for modification \??\c:\program files\SearchResume.ini v2.exe File created \??\c:\program files (x86)\e393rgycyf-readme.txt v2.exe File opened for modification \??\c:\program files\DenyTest.vsd v2.exe File opened for modification \??\c:\program files\PushSwitch.xsl v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 v2.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe 2284 v2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2284 v2.exe Token: SeTakeOwnershipPrivilege 2284 v2.exe Token: SeBackupPrivilege 456 vssvc.exe Token: SeRestorePrivilege 456 vssvc.exe Token: SeAuditPrivilege 456 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4372
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD58ceeb64d9072c9c940c2822ed9e0e685
SHA15ee00c45463be63fb56642d83f51bf047cdc5475
SHA25667adb7c57accaa810a5f91201ba08399cdc6249e8614b070c0f43255db3a671d
SHA5127983f411282afba0863dd9f5bccf1a41efdea43eff04a247fc22d73e44165590437de0af4922f3249b9c1f78721c5ba83e8a72026096738b542361e97291248d