Resubmissions

22/05/2025, 18:49

250522-xghassxrw7 10

22/05/2025, 18:46

250522-xepl4axrs6 10

22/05/2025, 14:22

250522-rpjkyavrv4 10

22/05/2025, 14:18

250522-rmk1zshj4x 10

29/04/2025, 21:41

250429-1j52estms7 10

22/04/2025, 17:09

250422-vphkeswlx5 10

22/04/2025, 16:35

250422-t3tzya1wav 10

14/04/2025, 17:40

250414-v89s1swlw9 10

Analysis

  • max time kernel
    1563s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2024, 10:05

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    166KB

  • MD5

    b75c8afa25a8372b37fbda25f99274fb

  • SHA1

    e40a172b0f9559b7c86005ee077f84695581db69

  • SHA256

    23b7ef18b61fe3ca542372a862d19fac734c24b5cecfe9682b211129fa88f998

  • SHA512

    9cc8c701ed9fb8505a1e9ca14f23a4bb4077182d449bc8d1bb560a477d55512f83cad8f503cf766d5d9644f53cca18ca50c449a6acab92f92ee776a2f12b3773

  • SSDEEP

    3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QbFLf2KKWeu:NJ0BXScFyfC3Hd4yghMWe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
        PID:2636

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2636-0-0x0000000000140000-0x000000000014A000-memory.dmp

            Filesize

            40KB

          • memory/2636-1-0x0000000000140000-0x000000000014A000-memory.dmp

            Filesize

            40KB

          • memory/2636-2-0x0000000000E30000-0x0000000000EF9000-memory.dmp

            Filesize

            804KB

          • memory/2636-4-0x0000000000190000-0x0000000000191000-memory.dmp

            Filesize

            4KB

          • memory/2636-6-0x00000000001A0000-0x00000000001A1000-memory.dmp

            Filesize

            4KB

          • memory/2636-8-0x00000000001B0000-0x00000000001B1000-memory.dmp

            Filesize

            4KB

          • memory/2636-7-0x0000000000760000-0x000000000077F000-memory.dmp

            Filesize

            124KB

          • memory/2636-5-0x00000000036B0000-0x00000000037DD000-memory.dmp

            Filesize

            1.2MB

          • memory/2636-3-0x0000000002530000-0x00000000025CF000-memory.dmp

            Filesize

            636KB

          • memory/2636-10-0x00000000001C0000-0x00000000001C6000-memory.dmp

            Filesize

            24KB

          • memory/2636-11-0x00000000001C0000-0x00000000001C6000-memory.dmp

            Filesize

            24KB

          • memory/2636-9-0x0000000003A70000-0x0000000003B79000-memory.dmp

            Filesize

            1.0MB