Resubmissions

28-04-2024 18:31

240428-w6cwyaec5v 10

21-04-2024 08:57

240421-kwwqhsfh8z 10

21-04-2024 05:45

240421-gfvazacf82 10

18-04-2024 19:05

240418-xry2ascb73 10

18-04-2024 16:34

240418-t3alashf75 10

04-03-2024 18:33

240304-w7b12ahg61 10

02-03-2024 17:01

240302-vjn51sff57 10

02-03-2024 10:05

240302-l4xhfscc7v 10

Analysis

  • max time kernel
    1566s
  • max time network
    1568s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 10:05

General

  • Target

    bazaar.2020.02/HEUR-Trojan-Ransom.Win32.Sodin.dll

  • Size

    166KB

  • MD5

    3cd7e62bc197926278810ea5f6adff19

  • SHA1

    ad18b4f27039aa3b3ca59b7b6d8ea5cb309d78a7

  • SHA256

    2a28f11ca820bd0bde24d41cb5307c8f2fa70174536ac13a99923ba70015b36f

  • SHA512

    214852706e4bb89464a92625e3594b19afe4c99157d1706493e4114ac5510a64d3af7ff88f09273c67ad3d20f1ead61e8740acc4147432c64755e9eccbac7c71

  • SSDEEP

    3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3Q44CTrZmDa:NJ0BXScFyfC3Hd4ygmoD

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Trojan-Ransom.Win32.Sodin.dll,#1
      2⤵
        PID:2244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2244-0-0x00000000000D0000-0x00000000000DA000-memory.dmp

      Filesize

      40KB

    • memory/2244-1-0x00000000000D0000-0x00000000000DA000-memory.dmp

      Filesize

      40KB

    • memory/2244-2-0x00000000034D0000-0x0000000003599000-memory.dmp

      Filesize

      804KB

    • memory/2244-3-0x00000000035A0000-0x000000000363F000-memory.dmp

      Filesize

      636KB

    • memory/2244-5-0x00000000000E0000-0x00000000000E1000-memory.dmp

      Filesize

      4KB

    • memory/2244-4-0x0000000003640000-0x000000000376D000-memory.dmp

      Filesize

      1.2MB

    • memory/2244-6-0x0000000000610000-0x000000000062F000-memory.dmp

      Filesize

      124KB

    • memory/2244-7-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2244-8-0x00000000003B0000-0x00000000003B1000-memory.dmp

      Filesize

      4KB

    • memory/2244-10-0x00000000003C0000-0x00000000003C6000-memory.dmp

      Filesize

      24KB

    • memory/2244-9-0x00000000039F0000-0x0000000003AF9000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-11-0x00000000003C0000-0x00000000003C6000-memory.dmp

      Filesize

      24KB