Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/06/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win11-20240508-en
General
-
Target
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
-
Size
115KB
-
MD5
63a945da1a63a8e56e8220c4ccf7fd0c
-
SHA1
a99cf1a2426edeac97c789d0a4b7d38606d7aa45
-
SHA256
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195
-
SHA512
34006d84587ea90e243ebe0dd6bde8bd502ed688001a412898cd4e4c16a5de5788a9fa4c53d3ea79e4307adaa74496e05b205bf9717ac833db976551b1a7c89c
-
SSDEEP
1536:ikB/Ih3+7QuoZVQgf5GV2jSzGpAyZ4ICS4AwnfxnuLdSbSmoNUExd9M4dgS:gFW7gSzKDin5nWhw4dgS
Malware Config
Extracted
C:\Users\of009-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F8E70BCCD1AA0F03
http://decryptor.cc/F8E70BCCD1AA0F03
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\H: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\U: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Y: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\F: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\J: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\O: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\R: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\D: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\B: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\P: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\T: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\X: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\I: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\L: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\E: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\K: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\M: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\N: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\S: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\V: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\A: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\W: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Q: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Z: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\thz744og2a75.bmp" ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification \??\c:\program files\ConvertMove.jfif ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\TraceProtect.ex_ ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ApproveCompare.search-ms ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\TraceProtect.dib ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\AddCompress.mpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\PopRename.vdx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RegisterUnprotect.wm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnprotectCheckpoint.fon ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnregisterResume.ppsm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\CloseDismount.nfo ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\GetUse.mpv2 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\JoinOpen.pot ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\MergeRedo.midi ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnblockDebug.jpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\BackupSelect.docm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConfirmRestore.docx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RepairPublish.wm ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RestoreUse.mpp ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnblockConvert.xml ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files\of009-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ImportUnprotect.potx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\NewUpdate.tiff ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files (x86)\of009-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\CompareLimit.vsx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SplitDismount.ogg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\StartConnect.TS ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\CheckpointWrite.doc ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\DismountInstall.php ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\InvokeRestore.ADT ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RequestConvertTo.png ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4748 powershell.exe 4748 powershell.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe Token: SeDebugPrivilege 4748 powershell.exe Token: SeBackupPrivilege 1516 vssvc.exe Token: SeRestorePrivilege 1516 vssvc.exe Token: SeAuditPrivilege 1516 vssvc.exe Token: SeTakeOwnershipPrivilege 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4748 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 80 PID 4796 wrote to memory of 4748 4796 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 80 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4872
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD5e9fb1bda3ca7ba8803adc9abe5c379e9
SHA11437a7eaae40ec09175d036e776513ba3b684618
SHA256c7a8f0ed6b16762120ef4df4d0b396d0cbc2ff4dfd50a4771c3d8162c6815bd9
SHA5127965b04f280b598ffb5c62a9a65b3446dcd0737a637f40ad0dca19557f60802ef6dd07407b17d4cdda337b53ab1e6a01ecec186e2f22abc846264506591b3aeb