Overview
overview
10Static
static
100c3b09213f...3c.exe
windows7-x64
80dab0428b4...50.exe
windows7-x64
1014d09a259f...32.exe
windows7-x64
1016c49d6775...56.exe
windows7-x64
71d241bd0b7...f4.exe
windows7-x64
92.exe
windows7-x64
6287a6b75d1...ad.exe
windows7-x64
1035b0676421...82.exe
windows7-x64
1039deb2f02f...9f.exe
windows7-x64
84.exe
windows7-x64
74a0f399840...33.exe
windows7-x64
105.exe
windows7-x64
853bdaf567e...fc.exe
windows7-x64
76.exe
windows7-x64
5646677375b...36.exe
windows7-x64
96dfb9490b1...f8.exe
windows7-x64
67.exe
windows7-x64
1071a20e2700...db.exe
windows7-x64
3835b0ef8f5...35.exe
windows7-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b15b78937c...ac.exe
windows7-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b3dc1bb1c7...1b.exe
windows7-x64
5b4e3091d31...81.exe
windows7-x64
10c1b35d3d70...c3.exe
windows7-x64
10caa5f52a78...78.exe
windows7-x64
10d2878de61f...0b.exe
windows7-x64
7dbadeff4af...30.exe
windows7-x64
10f5d893afc4...e9.exe
windows7-x64
9Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Behavioral task
behavioral1
Sample
0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
16c49d677559071b3fc71fb4bb1a3c85cdcf7c4c27454010f69bb0bd04b1c456.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1d241bd0b71408abcf11871a9318cbfcd925b195814951c3123abca27554c6f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
287a6b75d1776f89502a1fd0ec571adebff878becb0ebdcec703e8fc6e3885ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
35b067642173874bd2766da0d108401b4cf45d6e2a8b3971d95bf474be4f6282.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
39deb2f02fee04a430cff446b35b0984a66b563552775eb1309d35acca3a209f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
4a0f399840bb73f3b70d4461ec1a37cffcb3e4789c876042d133ed903c5d9333.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
53bdaf567e302201ef06847d8914477e9a3852fc57d8e50606eab6bcdbdda8fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
646677375bc0ecaad279751d8d09220d5d44e20570548f8475f36803affda636.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
7.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
835b0ef8f5cfdc2ca8c0d3deccbafc48604e4a5356f0104cedfdfa20b20c2735.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b15b78937cd33dfaedef28385b293c92b999f37b2a97d01d516f6189a6afefac.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b3dc1bb1c72c6bda1a7508147b2c92021aa18eb99d419db7e8245f32979cd01b.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d2878de61ff17b2ae8cd556a6935af332955f07acf1991ab30ddeba9a5ced20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dbadeff4af3fa7785d54d177db9608f24d405971cf642ca0759a203d9e895930.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f5d893afc4ad2e98606b597df186657b57f3d1e3a5abe51f800de6086aab84e9.exe
Resource
win7-20240903-en
General
-
Target
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
-
Size
164KB
-
MD5
2fd61f699532fe2b0691422aa285ba17
-
SHA1
bc9996b712c71319508a946ac2a004a131592438
-
SHA256
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3
-
SHA512
2f3788cdd321836901b64797854c0c9074fb3c7abfcce11a026087903171aa5df9e2adb7affd4d0c4e06cd1218e5b86d121e96608a728690160df88d2a51c5c8
-
SSDEEP
3072:FHixaVZFiOCDJtOicNDWEzZwb6KoGXHIENB:FHigLF5CCj5zZwOnGXH
Malware Config
Extracted
C:\Users\9557yb6-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AC3B72BF6D91F618
http://decryptor.top/AC3B72BF6D91F618
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process File opened (read-only) \??\H: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\N: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\O: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\T: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\W: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\Y: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\D: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\B: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\E: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\M: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\V: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\X: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\A: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\J: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\L: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\Q: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\R: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\S: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\G: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\I: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\K: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\P: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\U: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\Z: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened (read-only) \??\F: c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\430.bmp" c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Drops file in Program Files directory 41 IoCs
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process File opened for modification \??\c:\program files\CompleteConvert.dxf c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\DenyTest.inf c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\MeasureGroup.xlsm c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\SplitRepair.vstx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\StepDeny.vst c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\UnlockUndo.scf c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\AddCompare.wmv c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\EnterBlock.xlsb c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\HideSet.dwfx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\PingCopy.bmp c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\TraceBlock.png c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\9557yb6-readme.txt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File created \??\c:\program files\9557yb6-readme.txt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ExitDebug.vb c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\PopEnable.mid c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\9557yb6-readme.txt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ConfirmUndo.bmp c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ExportEnable.pcx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\FormatBackup.wmf c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\MoveRestore.3gp c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ShowGet.mpp c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\BackupGet.mp3 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\CopyMove.DVR c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\RegisterStart.ppt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\SubmitReset.wps c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ProtectStep.vsw c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File created \??\c:\program files (x86)\9557yb6-readme.txt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ApproveSplit.asx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ConfirmDisable.vsdx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\ConvertFromMeasure.vb c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\CopyOpen.png c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\MoveUndo.vbs c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\OutUnpublish.jpg c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\RegisterUnprotect.vdx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\RevokeSwitch.pub c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\SkipOpen.mp4 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\UnblockRemove.docx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\9557yb6-readme.txt c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\RestartDismount.mhtml c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\CompressShow.xlsm c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification \??\c:\program files\InvokeCopy.dwfx c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Drops file in Windows directory 64 IoCs
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-e..rtingcore.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_018b4fa043769680.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-kernel32_31bf3856ad364e35_6.1.7601.17932_none_f1cc51dc6cfd0cbf.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-lsa.resources_31bf3856ad364e35_6.1.7600.16385_de-de_39abefffc16e5209_lsasrv.dll.mui_d47f7e1c c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_79b8d8cfc8e56a7e_iprtrmgr.dll.mui_eb023b92 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp.resources_31bf3856ad364e35_6.1.7600.16385_es-es_1b633f84cf4098f0_hh.exe.mui_2744e397 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-s..ty-cng-keyisolation_31bf3856ad364e35_6.1.7600.16385_none_2a863865442ba065.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-rpc-local.resources_31bf3856ad364e35_6.1.7600.16385_en-us_9b91f4c11edec673.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-com-base.resources_31bf3856ad364e35_6.1.7600.16385_en-us_1474adc65759a4dd_oleres.dll.mui_ff00d4cb c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7601.17514_en-us_c342610ed289dc75_prflbmsg.dll.mui_4caa0054 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_cs-cz_a9a74ccae735a589.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-msvcrt_31bf3856ad364e35_6.1.7600.16385_none_2d4a27c7b8972454.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..utoenroll.resources_31bf3856ad364e35_6.1.7600.16385_en-us_bb0de36cbae98857.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-m..ditevtlog.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_fc5eccf9ae290445_adtschema.dll.mui_208d0981 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft.windows.winhttp.resources_31bf3856ad364e35_6.0.7600.16385_en-us_3d419a3aa700badf_winhttp.dll.mui_f661192f c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_uk-ua_e8c7e489ddaf3a0c.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ntmanager.resources_31bf3856ad364e35_6.1.7600.16385_it-it_25aceb9a2322fdb7.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rdbss_31bf3856ad364e35_6.1.7601.17514_none_b7fadd3b7808f9d5_rdbss.sys_f97a2535 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ure-ws232.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_98d4b6b35beff4c4_ws2_32.dll.mui_f13ef3a5 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-t..libraries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_08f5a3ad3ab2a987_iphlpapi.dll.mui_9531144c c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_51f6d6941d367e01_rasauto.dll.mui_12fa2c50 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-kernelbase.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0d369edfc1dff697_kernelbase.dll.mui_16288a65 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-winsock-legacy_31bf3856ad364e35_6.1.7600.16385_none_e33b8ccc72da5441.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_6.1.7600.16385_en-us_1d298d428a973659_gpapi.dll.mui_ef0a9748 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..tional-codepage-861_31bf3856ad364e35_6.1.7600.16385_none_2ade17e8b4e1da12_c_861.nls_bdea8f72 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_it-it_b4e23429b0fff2c9_netiougc.exe.mui_ad7a9e4d c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-efs-core-library_31bf3856ad364e35_6.1.7601.17514_none_b4c7e8f4ae2a1921.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..tional-codepage-949_31bf3856ad364e35_6.1.7600.16385_none_2ad09128b4ec905d_c_949.nls_a711f185 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..dem-voice.resources_31bf3856ad364e35_6.1.7600.16385_es-es_ed9a54ad162a8850_serwvdrv.dll.mui_6a9f4568 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-usp_31bf3856ad364e35_6.1.7601.17514_none_0b207e7d6f1bea6f.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-vssapi.resources_31bf3856ad364e35_6.1.7600.16385_es-es_4150642bed0c6eef_vsstrace.dll.mui_3a1fe238 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-ntlanman.resources_31bf3856ad364e35_6.1.7600.16385_en-us_3b97dd76a9b0dc17_ntlanman.dll.mui_690e687e c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-c..ityclient.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ef8490c876cbbf3a.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-installer-service_31bf3856ad364e35_6.1.7600.16385_none_f39e7046aecd86ef.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-fms_31bf3856ad364e35_6.1.7601.17514_none_a5f8bb0ccaefbe07_fms_metadata.xml_ad942f19 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7600.16385_none_cd7aeeff1897d018_perfd.dat_f1e3dfd2 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_en-us_28376affe6d50544_tcpipcfg.dll.mui_a5479fc1 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-e..e-library.resources_31bf3856ad364e35_6.1.7600.16385_en-us_6e5eadf52d4094a8.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-webservices_31bf3856ad364e35_6.1.7601.17514_none_6ca25da84551ca13_webservices.dll_58f50a80 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-netbt_31bf3856ad364e35_6.1.7601.17514_none_c8df7823424473a1.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e58ff5baa9a5ab26.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..truetype-lucidasans_31bf3856ad364e35_6.1.7600.16385_none_d0e8774fa1155a53_l_10646.ttf_f757c3ca c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_en-us_f39c285e7fbf22f0_scarddlg.dll.mui_300ae9df c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_de-de_a6c9ede9493e8861_scarddlg.dll.mui_300ae9df c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-webservices.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_997c59804d36f40c.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-dns-client.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_c5cadca61feef0d3_dnsapi.dll.mui_97465f8a c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_sr-..-cs_d00114a57d13e603_msimsg.dll.mui_72e8994f c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..tional-codepage-852_31bf3856ad364e35_6.1.7600.16385_none_cebe6552fc856926.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-legacyhwui.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_f36e4f388e096ead_hdwwiz.exe.mui_b4acc7bc c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_th-th_d3425786c0003660.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-msxml60.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_d40b16d89404e928_msxml6r.dll.mui_4516d602 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-object-picker_31bf3856ad364e35_6.1.7600.16385_none_0f6c30b96de81257.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_6.1.7600.16385_it-it_494dd8c9f3f02706.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_en-us_06eae3639ce15ec1_basecsp.dll.mui_04bea7ac c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..-netlogon.resources_31bf3856ad364e35_6.1.7600.16385_es-es_2f6537f1804ab0e6_netlogon.dll.mui_ecbeb9bd c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-crypt32-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_fccd7be8d8e00970_crypt32.dll.mui_4268f86a c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..temclient.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7497a71c57e547ec_winscard.dll.mui_4a82d97e c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shdocvw.resources_31bf3856ad364e35_6.1.7600.16385_es-es_c764748ebbb625b9.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-e..orerframe.resources_31bf3856ad364e35_6.1.7600.16385_es-es_af38ff0e0c7a9cb9.manifest c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b98e60acbd094074_axinstui.exe.mui_aea34130 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..environment-windows_31bf3856ad364e35_6.1.7601.17514_none_c75e9c99a36a285a_setbcdlocale.dll_77bec53b c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-ntdll.resources_31bf3856ad364e35_6.1.7600.16385_it-it_51346de63ffde7c5_ntdll.dll.mui_d908d391 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasbase_31bf3856ad364e35_6.1.7601.17514_none_6c066d50910ecf5a_rasdiag.dll_341d4299 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-win32k.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d829f74f35356bf6_win32k.sys.mui_c0d34fe8 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-sens-service.resources_31bf3856ad364e35_6.1.7600.16385_it-it_a1c3034d4d83b9c6_sens.dll.mui_64739194 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 603792324f3bdb01 powershell.exe -
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exepowershell.exepid Process 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 2652 powershell.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2652 powershell.exe Token: SeBackupPrivilege 2292 vssvc.exe Token: SeRestorePrivilege 2292 vssvc.exe Token: SeAuditPrivilege 2292 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exedescription pid Process procid_target PID 808 wrote to memory of 2652 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 30 PID 808 wrote to memory of 2652 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 30 PID 808 wrote to memory of 2652 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 30 PID 808 wrote to memory of 2652 808 c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe"C:\Users\Admin\AppData\Local\Temp\c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2568
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ca7cb55e7fcc5169251e25f086c03ca3
SHA18510153286ddd9c9c82eea264f9b0b5f989300fd
SHA256ae085176aef9f32d979c3d3845838629b75e160da1e1f45972d685af8d385a4a
SHA5120948ba577289b5f01f543472836f4ad140a63b6481f09d9f38881c7539319dd3494021ad251dcb665dc9dc92076e319dd4d9e009ca8a71976752a5c3947a763f