Resubmissions

28-04-2024 18:31

240428-w6cwyaec5v 10

21-04-2024 08:57

240421-kwwqhsfh8z 10

21-04-2024 05:45

240421-gfvazacf82 10

18-04-2024 19:05

240418-xry2ascb73 10

18-04-2024 16:34

240418-t3alashf75 10

04-03-2024 18:33

240304-w7b12ahg61 10

02-03-2024 17:01

240302-vjn51sff57 10

02-03-2024 10:05

240302-l4xhfscc7v 10

Analysis

  • max time kernel
    1563s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 10:05

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    166KB

  • MD5

    b75c8afa25a8372b37fbda25f99274fb

  • SHA1

    e40a172b0f9559b7c86005ee077f84695581db69

  • SHA256

    23b7ef18b61fe3ca542372a862d19fac734c24b5cecfe9682b211129fa88f998

  • SHA512

    9cc8c701ed9fb8505a1e9ca14f23a4bb4077182d449bc8d1bb560a477d55512f83cad8f503cf766d5d9644f53cca18ca50c449a6acab92f92ee776a2f12b3773

  • SSDEEP

    3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QbFLf2KKWeu:NJ0BXScFyfC3Hd4yghMWe

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
        PID:2636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2636-0-0x0000000000140000-0x000000000014A000-memory.dmp
      Filesize

      40KB

    • memory/2636-1-0x0000000000140000-0x000000000014A000-memory.dmp
      Filesize

      40KB

    • memory/2636-2-0x0000000000E30000-0x0000000000EF9000-memory.dmp
      Filesize

      804KB

    • memory/2636-4-0x0000000000190000-0x0000000000191000-memory.dmp
      Filesize

      4KB

    • memory/2636-6-0x00000000001A0000-0x00000000001A1000-memory.dmp
      Filesize

      4KB

    • memory/2636-8-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/2636-7-0x0000000000760000-0x000000000077F000-memory.dmp
      Filesize

      124KB

    • memory/2636-5-0x00000000036B0000-0x00000000037DD000-memory.dmp
      Filesize

      1.2MB

    • memory/2636-3-0x0000000002530000-0x00000000025CF000-memory.dmp
      Filesize

      636KB

    • memory/2636-10-0x00000000001C0000-0x00000000001C6000-memory.dmp
      Filesize

      24KB

    • memory/2636-11-0x00000000001C0000-0x00000000001C6000-memory.dmp
      Filesize

      24KB

    • memory/2636-9-0x0000000003A70000-0x0000000003B79000-memory.dmp
      Filesize

      1.0MB