Overview
overview
10Static
static
100c3b09213f...3c.exe
windows7-x64
80dab0428b4...50.exe
windows7-x64
1014d09a259f...32.exe
windows7-x64
1016c49d6775...56.exe
windows7-x64
71d241bd0b7...f4.exe
windows7-x64
92.exe
windows7-x64
6287a6b75d1...ad.exe
windows7-x64
1035b0676421...82.exe
windows7-x64
1039deb2f02f...9f.exe
windows7-x64
84.exe
windows7-x64
74a0f399840...33.exe
windows7-x64
105.exe
windows7-x64
853bdaf567e...fc.exe
windows7-x64
76.exe
windows7-x64
5646677375b...36.exe
windows7-x64
96dfb9490b1...f8.exe
windows7-x64
67.exe
windows7-x64
1071a20e2700...db.exe
windows7-x64
3835b0ef8f5...35.exe
windows7-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b15b78937c...ac.exe
windows7-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b3dc1bb1c7...1b.exe
windows7-x64
5b4e3091d31...81.exe
windows7-x64
10c1b35d3d70...c3.exe
windows7-x64
10caa5f52a78...78.exe
windows7-x64
10d2878de61f...0b.exe
windows7-x64
7dbadeff4af...30.exe
windows7-x64
10f5d893afc4...e9.exe
windows7-x64
9Analysis
-
max time kernel
12s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Behavioral task
behavioral1
Sample
0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
16c49d677559071b3fc71fb4bb1a3c85cdcf7c4c27454010f69bb0bd04b1c456.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1d241bd0b71408abcf11871a9318cbfcd925b195814951c3123abca27554c6f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
287a6b75d1776f89502a1fd0ec571adebff878becb0ebdcec703e8fc6e3885ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
35b067642173874bd2766da0d108401b4cf45d6e2a8b3971d95bf474be4f6282.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
39deb2f02fee04a430cff446b35b0984a66b563552775eb1309d35acca3a209f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
4a0f399840bb73f3b70d4461ec1a37cffcb3e4789c876042d133ed903c5d9333.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
53bdaf567e302201ef06847d8914477e9a3852fc57d8e50606eab6bcdbdda8fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
646677375bc0ecaad279751d8d09220d5d44e20570548f8475f36803affda636.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
7.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
835b0ef8f5cfdc2ca8c0d3deccbafc48604e4a5356f0104cedfdfa20b20c2735.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b15b78937cd33dfaedef28385b293c92b999f37b2a97d01d516f6189a6afefac.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b3dc1bb1c72c6bda1a7508147b2c92021aa18eb99d419db7e8245f32979cd01b.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d2878de61ff17b2ae8cd556a6935af332955f07acf1991ab30ddeba9a5ced20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dbadeff4af3fa7785d54d177db9608f24d405971cf642ca0759a203d9e895930.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f5d893afc4ad2e98606b597df186657b57f3d1e3a5abe51f800de6086aab84e9.exe
Resource
win7-20240903-en
General
-
Target
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
-
Size
164KB
-
MD5
921b05d4fdd12c986bed19ae96d10fc4
-
SHA1
b6cdb9f5693da24b95fb479b191504f7e22cf717
-
SHA256
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181
-
SHA512
72f5dc8c1c205cba6bf89bc274beb57e31723736a9040c4231a12b8c2ff0095cf35201e993ee88b636165da465d5516dfeae50b1d332ba15c8a739a479c0ff21
-
SSDEEP
3072:FHixaVZFiOCDJtOicNDWEzZz61d7canxB:FHigLF5CCj5zZ41
Malware Config
Extracted
C:\Users\11xy9-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/120D228E2FAC83AE
http://decryptor.top/120D228E2FAC83AE
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exedescription ioc Process File opened (read-only) \??\Y: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\Z: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\E: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\H: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\N: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\P: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\Q: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\T: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\B: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\G: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\J: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\O: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\R: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\F: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\A: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\K: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\S: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\U: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\W: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\D: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\I: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\L: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\M: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\V: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened (read-only) \??\X: b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uza5gd22lx3.bmp" b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe -
Drops file in Program Files directory 13 IoCs
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exedescription ioc Process File created \??\c:\program files (x86)\microsoft sql server compact edition\11xy9-readme.txt b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\11xy9-readme.txt b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File created \??\c:\program files\11xy9-readme.txt b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File created \??\c:\program files (x86)\11xy9-readme.txt b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\HideRemove.rle b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\UnblockExpand.rar b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\UnpublishOut.mht b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\UnregisterExit.temp b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\DenyExpand.dotx b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\DenyResolve.m1v b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\SaveStart.mhtml b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File opened for modification \??\c:\program files\TestTrace.mht b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\11xy9-readme.txt b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exepowershell.exepid Process 1812 b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe 2020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2020 powershell.exe Token: SeBackupPrivilege 2776 vssvc.exe Token: SeRestorePrivilege 2776 vssvc.exe Token: SeAuditPrivilege 2776 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exedescription pid Process procid_target PID 1812 wrote to memory of 2020 1812 b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe 31 PID 1812 wrote to memory of 2020 1812 b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe 31 PID 1812 wrote to memory of 2020 1812 b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe 31 PID 1812 wrote to memory of 2020 1812 b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe"C:\Users\Admin\AppData\Local\Temp\b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2332
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD536498cb8adc2e7e5a80feb358d9811cd
SHA164ff42e2188a9dc482dc9051681f493668a05b5f
SHA2563efa613f3d29c1c16188b5cac4d19cb60f6e0e276ae75181b64fbad97b2c1fb6
SHA512bf75fa88d14e9bef856a891b803f99d5dfdf43723505d1949ec89f0976b8c0361eb3ba1fc2bd864a4f4f1e0c17c93389c304321821268fe984d6a3fa46db85be