Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 10:58
Behavioral task
behavioral1
Sample
747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519.dll
Resource
win10v2004-20240802-en
General
-
Target
747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519.dll
-
Size
164KB
-
MD5
8afd4dcef4e3dcef755ecb2a996959ea
-
SHA1
803e092fe8612172bdad5111c7f783e81d55ed7b
-
SHA256
747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519
-
SHA512
27724aa4f1c4ec52fd56b4422bcaa5dfe73ecbe1a2f174c3695923e1717f831e32e6349b1c37848788ce6d8e22f4bda9ee73aab1df2a794eeda13b81f46610a9
-
SSDEEP
3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfDUqVEcqDdh78Kj:veoUeZR2TRCWQFfDUqV3gZ
Malware Config
Extracted
C:\Users\xm0n48fdk-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1457B8581ACAE50F
http://decryptor.top/1457B8581ACAE50F
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\N: rundll32.exe -
Drops file in Program Files directory 22 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\program files\ExitUnregister.mht rundll32.exe File opened for modification \??\c:\program files\RenameConvertTo.mht rundll32.exe File opened for modification \??\c:\program files\UninstallExpand.vstx rundll32.exe File opened for modification \??\c:\program files\TraceUnprotect.gif rundll32.exe File created \??\c:\program files (x86)\xm0n48fdk-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupSet.ppsm rundll32.exe File opened for modification \??\c:\program files\ConvertFromConvert.emf rundll32.exe File opened for modification \??\c:\program files\ExpandBackup.cr2 rundll32.exe File opened for modification \??\c:\program files\ReadEnter.mpe rundll32.exe File opened for modification \??\c:\program files\StopConvertTo.wax rundll32.exe File opened for modification \??\c:\program files\PublishRename.vssx rundll32.exe File opened for modification \??\c:\program files\StartClear.ods rundll32.exe File opened for modification \??\c:\program files\UndoApprove.inf rundll32.exe File opened for modification \??\c:\program files\WaitSend.csv rundll32.exe File opened for modification \??\c:\program files\ReceiveExpand.wpl rundll32.exe File opened for modification \??\c:\program files\SelectLimit.vssx rundll32.exe File created \??\c:\program files\xm0n48fdk-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupRead.asf rundll32.exe File opened for modification \??\c:\program files\ConvertToRestore.ini rundll32.exe File opened for modification \??\c:\program files\InstallMerge.rm rundll32.exe File opened for modification \??\c:\program files\MeasureSend.aiff rundll32.exe File opened for modification \??\c:\program files\OutUndo.aifc rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 1468 rundll32.exe 1468 rundll32.exe 544 powershell.exe 544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1468 rundll32.exe Token: SeDebugPrivilege 544 powershell.exe Token: SeBackupPrivilege 2332 vssvc.exe Token: SeRestorePrivilege 2332 vssvc.exe Token: SeAuditPrivilege 2332 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1844 wrote to memory of 1468 1844 rundll32.exe rundll32.exe PID 1844 wrote to memory of 1468 1844 rundll32.exe rundll32.exe PID 1844 wrote to memory of 1468 1844 rundll32.exe rundll32.exe PID 1468 wrote to memory of 544 1468 rundll32.exe powershell.exe PID 1468 wrote to memory of 544 1468 rundll32.exe powershell.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\747215655246587e4db7d04356ca00afa7fbe25b7fd1f3ba4f182670a9b86519.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4940
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5ab26ef8301877302488cd0b136dd1671
SHA16c1c5786b849b3d4407da2397d712783e5d4a02b
SHA256fe01fbb4482592f4a461a6625396a2589f40c61c30145f6624d922a8f96bce06
SHA512be01af73d216ed76fd3a493e7073f40cd0f548527fdd6b2996260579711575f8730a0351f30db32581e8b3c74e3854fcc11585ca1fdb85b95614db5558dcc54c