Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2024 11:58
Static task
static1
Behavioral task
behavioral1
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win11-20240508-en
General
-
Target
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
-
Size
115KB
-
MD5
63a945da1a63a8e56e8220c4ccf7fd0c
-
SHA1
a99cf1a2426edeac97c789d0a4b7d38606d7aa45
-
SHA256
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195
-
SHA512
34006d84587ea90e243ebe0dd6bde8bd502ed688001a412898cd4e4c16a5de5788a9fa4c53d3ea79e4307adaa74496e05b205bf9717ac833db976551b1a7c89c
-
SSDEEP
1536:ikB/Ih3+7QuoZVQgf5GV2jSzGpAyZ4ICS4AwnfxnuLdSbSmoNUExd9M4dgS:gFW7gSzKDin5nWhw4dgS
Malware Config
Extracted
C:\Users\93z2w2j3-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0846C4A22137B9D5
http://decryptor.cc/0846C4A22137B9D5
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\O: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\H: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Y: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\E: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\R: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\W: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\D: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\A: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\M: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\P: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\S: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\I: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\F: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Z: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\K: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Q: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\U: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\V: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\X: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\G: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\J: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\L: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\T: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\B: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\y0buebz0y4a4v.bmp" ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification \??\c:\program files\BackupExpand.mpg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\BackupLimit.wax ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\EnableInvoke.pptm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files\93z2w2j3-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConnectBlock.snd ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConvertToStep.wps ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\MeasureRead.tiff ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SelectComplete.ppt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\InitializeClear.pptm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SplitUnprotect.ods ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UninstallMount.mpeg2 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files (x86)\93z2w2j3-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConnectBlock.ttf ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\DismountPop.aif ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\LimitSave.wdp ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\MeasureSearch.odt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\MoveUse.htm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\TestComplete.ADTS ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ExportHide.kix ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ResolveInstall.pptx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnprotectGrant.ttf ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\CheckpointSuspend.jtx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\InstallSelect.cfg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\OutSubmit.ADT ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SelectCheckpoint.xml ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnprotectConvertTo.otf ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnpublishRedo.ADT ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\CheckpointExport.au3 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\FindCheckpoint.raw ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\MoveInvoke.jpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\PushStop.wdp ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UndoHide.jpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\BackupGet.3gp2 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConvertFromBlock.cr2 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\DisableFind.xlsb ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ExpandSplit.mpg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnlockClear.dxf ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4648 powershell.exe 4648 powershell.exe 4648 powershell.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeBackupPrivilege 1388 vssvc.exe Token: SeRestorePrivilege 1388 vssvc.exe Token: SeAuditPrivilege 1388 vssvc.exe Token: SeTakeOwnershipPrivilege 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4648 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 74 PID 2820 wrote to memory of 4648 2820 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 74 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2732
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52ab808d861b1e618d6611ff8dce9bc71
SHA1c9afb807887fc85a5128be2f75d4d3d676fece71
SHA256bf04e4001e0f6afac785b833cf21ecccd480077094b372a8d8ec87a5f4291075
SHA512f2d66a1ce7b5c839af09c19e1464dad22ef423f76caa4a61696d60e4eb76b355c42aa2cc855fc9376a4b9197f421570b5d0f7f6dc70027331d92ddee3a8723d9
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a