Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe
Resource
win10v2004-20240802-en
General
-
Target
2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe
-
Size
118KB
-
MD5
9c08dfc58885a9a7beca989ea5ee9108
-
SHA1
ce2f51348da7a19dbf0e79b64f9eb8e46f45efa3
-
SHA256
2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e
-
SHA512
34cf39e4976f264f31b3236cca87aeca04ebc447fe99b35bbb72dd126462eed78310954fcdebab48b1f3ad9eaf5efe22ad8405b12d80ddd357244138067a1ae2
-
SSDEEP
1536:pRGfmACfvCHeQ5EJRDKiMIfB6Ym5p/eyxICS4AxpoC3/0bZ2YySvKxBPyAU0DeWj:omRj6YaWm8/0bZCSvKDyhVv
Malware Config
Extracted
C:\Recovery\ba13f242-3a65-11ef-94cb-d685e2345d05\5ff5vl9-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A2926C1C661E195F
http://decoder.re/A2926C1C661E195F
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\N: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\I: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\L: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\D: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\A: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\V: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\Q: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\G: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\P: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\O: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\U: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\F: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\E: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\S: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\T: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\W: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\X: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\Y: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\Z: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\H: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\R: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\J: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\K: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened (read-only) \??\B: 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e0c13p7ggz.bmp" 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification \??\c:\program files\DisableUnblock.rtf 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ExpandComplete.eprtx 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ImportProtect.mht 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\LockRestore.mp2v 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\WatchReset.docx 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\BackupInstall.TTS 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\EditPublish.mpv2 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\EnterConnect.avi 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\InvokeExport.ttf 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\SyncRegister.jfif 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\DebugApprove.dotx 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\DisableSend.mhtml 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\CompareResolve.mp4 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ExportRestore.scf 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\PublishGrant.mid 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ConnectLock.vsx 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ResumeSwitch.zip 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\5ff5vl9-readme.txt 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\BackupStop.xlsm 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ClearExport.mp4 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ConvertFromDebug.docx 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\WaitRevoke.ttc 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ResetConvert.odp 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\RestartRemove.css 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File opened for modification \??\c:\program files\ShowRequest.asp 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\5ff5vl9-readme.txt 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\5ff5vl9-readme.txt 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3024 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe 3024 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3024 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Token: SeTakeOwnershipPrivilege 3024 2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe Token: SeBackupPrivilege 2624 vssvc.exe Token: SeRestorePrivilege 2624 vssvc.exe Token: SeAuditPrivilege 2624 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe"C:\Users\Admin\AppData\Local\Temp\2aef1134cb696c922a06b71d58058d44e804391ff44cc5cd54335a1438fba58e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2916
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e0d68712d1c93004521fcee2a9cf2d80
SHA1c9c67b3bb7276afb03522ce5912e65396f1bdb8b
SHA25616e25d20ff0971ac8d51b158b1d87f66bc7c2b32cbd05e8754ec37a94c2433c5
SHA51266100c233284ac59ef915eb8e18a3b26cb67738048ecb9e926a1a317fc359892630a252ddb8085b33056610326c397c3ad252317362f6cae3106992efe6d4379
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
191KB
MD511a3740edce2eac6887381debfd12500
SHA1a1cb7555c09a95a42b24061a5c0464221c0c5ca5
SHA256eec52bd41758986d3fa2c5b30d178cf6bd513cc8c2cd8185e8b45a1bce20d828
SHA512c8431b1726db94350b34dc041b68ce77d7920b563c7456c98bb1316c6d4827aef5fc0543d33c324364b90a86219497c0cb976cfd10e26ea132e8fb8ba9839bc2