Resubmissions

28-04-2024 18:31

240428-w6cwyaec5v 10

21-04-2024 08:57

240421-kwwqhsfh8z 10

21-04-2024 05:45

240421-gfvazacf82 10

18-04-2024 19:05

240418-xry2ascb73 10

18-04-2024 16:34

240418-t3alashf75 10

04-03-2024 18:33

240304-w7b12ahg61 10

02-03-2024 17:01

240302-vjn51sff57 10

02-03-2024 10:05

240302-l4xhfscc7v 10

Analysis

  • max time kernel
    1564s
  • max time network
    1573s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 10:05

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    164KB

  • MD5

    b039e1d100166dc2e80ac9ff3f658481

  • SHA1

    7ff4100e822925edf67ccf03ec7b39babacf70cd

  • SHA256

    23096a2bc9feeabd37a9704d0653f4628ef740cdfe24af364ee09d379ec39d95

  • SHA512

    a41fa1ba35ab11f8ee4a8c45286bd7ccf48a8ced9498c6abbfd43d42286bd88a346921e7ae1534510ff574b6e55b37c52ebf32ebd2c65d2095ed997e330fa24c

  • SSDEEP

    3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfG4gdYR3NQT3U:veoUeZR2TRCWQFfG4gdYR3NQTE

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
        PID:2084

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-2-0x0000000002C00000-0x0000000002CC9000-memory.dmp

      Filesize

      804KB

    • memory/2084-1-0x00000000000B0000-0x00000000000BA000-memory.dmp

      Filesize

      40KB

    • memory/2084-3-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB

    • memory/2084-0-0x00000000000B0000-0x00000000000BA000-memory.dmp

      Filesize

      40KB

    • memory/2084-4-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2084-8-0x0000000000590000-0x00000000005AF000-memory.dmp

      Filesize

      124KB

    • memory/2084-7-0x00000000031C0000-0x00000000032ED000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2084-5-0x0000000003120000-0x00000000031BF000-memory.dmp

      Filesize

      636KB

    • memory/2084-10-0x0000000000200000-0x0000000000206000-memory.dmp

      Filesize

      24KB

    • memory/2084-9-0x0000000003610000-0x0000000003719000-memory.dmp

      Filesize

      1.0MB

    • memory/2084-11-0x0000000000200000-0x0000000000206000-memory.dmp

      Filesize

      24KB