Overview
overview
10Static
static
100c3b09213f...3c.exe
windows7-x64
80dab0428b4...50.exe
windows7-x64
1014d09a259f...32.exe
windows7-x64
1016c49d6775...56.exe
windows7-x64
71d241bd0b7...f4.exe
windows7-x64
92.exe
windows7-x64
6287a6b75d1...ad.exe
windows7-x64
1035b0676421...82.exe
windows7-x64
1039deb2f02f...9f.exe
windows7-x64
84.exe
windows7-x64
74a0f399840...33.exe
windows7-x64
105.exe
windows7-x64
853bdaf567e...fc.exe
windows7-x64
76.exe
windows7-x64
5646677375b...36.exe
windows7-x64
96dfb9490b1...f8.exe
windows7-x64
67.exe
windows7-x64
1071a20e2700...db.exe
windows7-x64
3835b0ef8f5...35.exe
windows7-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b15b78937c...ac.exe
windows7-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b3dc1bb1c7...1b.exe
windows7-x64
5b4e3091d31...81.exe
windows7-x64
10c1b35d3d70...c3.exe
windows7-x64
10caa5f52a78...78.exe
windows7-x64
10d2878de61f...0b.exe
windows7-x64
7dbadeff4af...30.exe
windows7-x64
10f5d893afc4...e9.exe
windows7-x64
9Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Behavioral task
behavioral1
Sample
0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
16c49d677559071b3fc71fb4bb1a3c85cdcf7c4c27454010f69bb0bd04b1c456.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1d241bd0b71408abcf11871a9318cbfcd925b195814951c3123abca27554c6f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
287a6b75d1776f89502a1fd0ec571adebff878becb0ebdcec703e8fc6e3885ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
35b067642173874bd2766da0d108401b4cf45d6e2a8b3971d95bf474be4f6282.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
39deb2f02fee04a430cff446b35b0984a66b563552775eb1309d35acca3a209f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
4a0f399840bb73f3b70d4461ec1a37cffcb3e4789c876042d133ed903c5d9333.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
53bdaf567e302201ef06847d8914477e9a3852fc57d8e50606eab6bcdbdda8fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
646677375bc0ecaad279751d8d09220d5d44e20570548f8475f36803affda636.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
7.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
835b0ef8f5cfdc2ca8c0d3deccbafc48604e4a5356f0104cedfdfa20b20c2735.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b15b78937cd33dfaedef28385b293c92b999f37b2a97d01d516f6189a6afefac.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b3dc1bb1c72c6bda1a7508147b2c92021aa18eb99d419db7e8245f32979cd01b.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d2878de61ff17b2ae8cd556a6935af332955f07acf1991ab30ddeba9a5ced20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dbadeff4af3fa7785d54d177db9608f24d405971cf642ca0759a203d9e895930.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f5d893afc4ad2e98606b597df186657b57f3d1e3a5abe51f800de6086aab84e9.exe
Resource
win7-20240903-en
General
-
Target
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
-
Size
179KB
-
MD5
6a37119a7900d7c994cafb86166c3a78
-
SHA1
39e3d7eba4333f2fa4ff9a9a24ca8e84b2ad47cf
-
SHA256
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50
-
SHA512
dc9df8dc9d52e477634f87fae065fac74440a0fdd8758a617fcf327b983476edc57e3ecd4b171206a36be76792a8f28662b65a5cf9f3cc61c32fdd28b391dc89
-
SSDEEP
3072:kEa2d8CfSXceqmPDu4lPZU/CZtpysa8ustqzhyb4lJklds:iCqlPDuGPG/abesYzgaJkld
Malware Config
Extracted
C:\Users\54z17cg33-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/328660EF4623E3CD
http://decryptor.top/328660EF4623E3CD
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\B: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\H: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\O: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\Q: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\W: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\A: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\G: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\K: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\S: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\U: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\X: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\Y: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\E: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\I: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\R: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\T: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\P: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\V: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\D: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\F: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\J: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\L: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\M: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened (read-only) \??\N: 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\318u087613d4d.bmp" 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification \??\c:\program files\JoinRestart.wmv 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ReceiveRestore.rmi 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ResumeReceive.wmf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ClearJoin.snd 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\InitializeApprove.emz 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ConvertToSplit.snd 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\InvokeExit.cfg 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\PopMount.xla 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\StartRename.mpeg 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\BlockExpand.ogg 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ClearSkip.html 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ProtectJoin.tif 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\WaitDismount.rle 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\54z17cg33-readme.txt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\CompleteWait.ttf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ConnectAdd.midi 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\OutMeasure.svgz 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\PingSubmit.ttf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ReceiveWatch.wav 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\TraceBlock.mp4 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File created \??\c:\program files (x86)\54z17cg33-readme.txt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\BlockRedo.ttf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ImportSave.MTS 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\RepairWait.xlt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\UnregisterPush.wmv 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\UpdateSwitch.odt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\54z17cg33-readme.txt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ClearSend.contact 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ConnectRequest.iso 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\54z17cg33-readme.txt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File created \??\c:\program files\54z17cg33-readme.txt 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\MoveSave.midi 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\RestoreDisconnect.au3 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\SetAdd.xla 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\InvokeGroup.rmi 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\OpenBlock.pptm 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\GrantClear.M2V 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\RepairEdit.wvx 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\ResolveUnlock.wmf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\StepUse.crw 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\CompressSearch.xlsx 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe File opened for modification \??\c:\program files\DenyGroup.otf 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe Token: SeBackupPrivilege 2648 vssvc.exe Token: SeRestorePrivilege 2648 vssvc.exe Token: SeAuditPrivilege 2648 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2836 2724 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe 32 PID 2724 wrote to memory of 2836 2724 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe 32 PID 2724 wrote to memory of 2836 2724 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe 32 PID 2724 wrote to memory of 2836 2724 0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe 32 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe"C:\Users\Admin\AppData\Local\Temp\0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2408
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD501fde81e85c7f68dd7112d46fd4adb94
SHA1ac6eadcdbd59b4db446f288f7d8a95fbfabf5417
SHA256d211997bb958b66b50fb866fc710addc59412bdb38616c4b8cbcf3ace059aa8f
SHA51254ce8955d1ccbbb8b96bb78927804e450af3b0bcac1806543507a9648869b8de1f9fd0a13e1f6db22237400d5c5a77185f5077e275dd23b5d0d750d578d26fba