Resubmissions

28-04-2024 18:31

240428-w6cwyaec5v 10

21-04-2024 08:57

240421-kwwqhsfh8z 10

21-04-2024 05:45

240421-gfvazacf82 10

18-04-2024 19:05

240418-xry2ascb73 10

18-04-2024 16:34

240418-t3alashf75 10

04-03-2024 18:33

240304-w7b12ahg61 10

02-03-2024 17:01

240302-vjn51sff57 10

02-03-2024 10:05

240302-l4xhfscc7v 10

Analysis

  • max time kernel
    1559s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 10:05

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    166KB

  • MD5

    acbd7cf1df4ef4e2c4812747cd443e66

  • SHA1

    9e386231a88ffafb3597fddfa909289febf105df

  • SHA256

    218ad6e33041a0bdb60c8de03e7dcdf42e5392e106a4b5b0436cdaa02a8dd2c9

  • SHA512

    8f116add8d2108ad314221bb4fb77308884c849d8f614f140ca7d989e481b4024afa37a768d20257296c0a6715ca8bb1341081eb896a6045617ea4e403b676f5

  • SSDEEP

    3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3Q3VMg7UEgZp6:NJ0BXScFyfC3Hd4yg3V5K

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
        PID:2268

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2268-0-0x00000000000B0000-0x00000000000BA000-memory.dmp

      Filesize

      40KB

    • memory/2268-1-0x0000000002070000-0x0000000002139000-memory.dmp

      Filesize

      804KB

    • memory/2268-2-0x00000000000D0000-0x00000000000D1000-memory.dmp

      Filesize

      4KB

    • memory/2268-3-0x0000000002330000-0x00000000023CF000-memory.dmp

      Filesize

      636KB

    • memory/2268-5-0x00000000030D0000-0x00000000031FD000-memory.dmp

      Filesize

      1.2MB

    • memory/2268-4-0x00000000000E0000-0x00000000000E1000-memory.dmp

      Filesize

      4KB

    • memory/2268-7-0x0000000000270000-0x000000000028F000-memory.dmp

      Filesize

      124KB

    • memory/2268-6-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2268-9-0x0000000003470000-0x0000000003579000-memory.dmp

      Filesize

      1.0MB

    • memory/2268-10-0x0000000000140000-0x0000000000146000-memory.dmp

      Filesize

      24KB

    • memory/2268-12-0x0000000000140000-0x0000000000146000-memory.dmp

      Filesize

      24KB

    • memory/2268-8-0x0000000000140000-0x0000000000146000-memory.dmp

      Filesize

      24KB