Overview
overview
10Static
static
100c3b09213f...3c.exe
windows7-x64
80dab0428b4...50.exe
windows7-x64
1014d09a259f...32.exe
windows7-x64
1016c49d6775...56.exe
windows7-x64
71d241bd0b7...f4.exe
windows7-x64
92.exe
windows7-x64
6287a6b75d1...ad.exe
windows7-x64
1035b0676421...82.exe
windows7-x64
1039deb2f02f...9f.exe
windows7-x64
84.exe
windows7-x64
74a0f399840...33.exe
windows7-x64
105.exe
windows7-x64
853bdaf567e...fc.exe
windows7-x64
76.exe
windows7-x64
5646677375b...36.exe
windows7-x64
96dfb9490b1...f8.exe
windows7-x64
67.exe
windows7-x64
1071a20e2700...db.exe
windows7-x64
3835b0ef8f5...35.exe
windows7-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b15b78937c...ac.exe
windows7-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b3dc1bb1c7...1b.exe
windows7-x64
5b4e3091d31...81.exe
windows7-x64
10c1b35d3d70...c3.exe
windows7-x64
10caa5f52a78...78.exe
windows7-x64
10d2878de61f...0b.exe
windows7-x64
7dbadeff4af...30.exe
windows7-x64
10f5d893afc4...e9.exe
windows7-x64
9Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Behavioral task
behavioral1
Sample
0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
16c49d677559071b3fc71fb4bb1a3c85cdcf7c4c27454010f69bb0bd04b1c456.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1d241bd0b71408abcf11871a9318cbfcd925b195814951c3123abca27554c6f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
287a6b75d1776f89502a1fd0ec571adebff878becb0ebdcec703e8fc6e3885ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
35b067642173874bd2766da0d108401b4cf45d6e2a8b3971d95bf474be4f6282.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
39deb2f02fee04a430cff446b35b0984a66b563552775eb1309d35acca3a209f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
4a0f399840bb73f3b70d4461ec1a37cffcb3e4789c876042d133ed903c5d9333.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
53bdaf567e302201ef06847d8914477e9a3852fc57d8e50606eab6bcdbdda8fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
646677375bc0ecaad279751d8d09220d5d44e20570548f8475f36803affda636.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
7.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
835b0ef8f5cfdc2ca8c0d3deccbafc48604e4a5356f0104cedfdfa20b20c2735.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b15b78937cd33dfaedef28385b293c92b999f37b2a97d01d516f6189a6afefac.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b3dc1bb1c72c6bda1a7508147b2c92021aa18eb99d419db7e8245f32979cd01b.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d2878de61ff17b2ae8cd556a6935af332955f07acf1991ab30ddeba9a5ced20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dbadeff4af3fa7785d54d177db9608f24d405971cf642ca0759a203d9e895930.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f5d893afc4ad2e98606b597df186657b57f3d1e3a5abe51f800de6086aab84e9.exe
Resource
win7-20240903-en
General
-
Target
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
-
Size
164KB
-
MD5
c4afb5d2f4bb0c266db26f5f25819493
-
SHA1
6795a2ae5c68886de7fdf4b3709034d6d7cbde94
-
SHA256
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78
-
SHA512
ca0ee738604ff97441ee279af93920ad915a350329229921fdbe093fe2d0de02296bdd57a81096eb3f62510ef5903a72249395129cb28838273d13fc530c7425
-
SSDEEP
3072:FHixaVZFiOCDJtOicNDWEzZEHHiR29t0VB:FHigLF5CCj5zZSK20j
Malware Config
Extracted
C:\Users\h9wvag5ow-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/07AEE12AD0172B5E
http://decryptor.top/07AEE12AD0172B5E
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\E: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\H: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\I: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\K: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\M: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\N: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\R: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\G: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\L: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\O: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\P: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\Q: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\X: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\Y: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\Z: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\D: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\W: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\F: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\B: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\J: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\S: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\T: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\U: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened (read-only) \??\V: caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\92n3r.bmp" caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification \??\c:\program files\RemoveCompare.zip caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\DebugRegister.rm caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\UnprotectDisable.xml caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\UnregisterEdit.pub caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\h9wvag5ow-readme.txt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\CheckpointUnlock.html caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\DebugSplit.aifc caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\DismountComplete.wma caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\RenameRead.wpl caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\h9wvag5ow-readme.txt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\h9wvag5ow-readme.txt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\DismountJoin.emf caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\SkipUnpublish.scf caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\ImportResolve.AAC caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\RevokeSkip.ADTS caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\WaitComplete.odt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\DismountExpand.odt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\ShowSuspend.rtf caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\SubmitCopy.xlsb caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File created \??\c:\program files\h9wvag5ow-readme.txt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File created \??\c:\program files (x86)\h9wvag5ow-readme.txt caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\CopyWait.pot caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\MountMove.ram caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\StepMount.mp2v caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\OpenProtect.dib caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\TraceEnter.wmv caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe File opened for modification \??\c:\program files\UpdateConvertFrom.ppsm caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe 2420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2420 powershell.exe Token: SeBackupPrivilege 2188 vssvc.exe Token: SeRestorePrivilege 2188 vssvc.exe Token: SeAuditPrivilege 2188 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2420 2092 caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe 30 PID 2092 wrote to memory of 2420 2092 caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe 30 PID 2092 wrote to memory of 2420 2092 caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe 30 PID 2092 wrote to memory of 2420 2092 caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe"C:\Users\Admin\AppData\Local\Temp\caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2528
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c747a839dffc9fd956b6a2af2e3ff911
SHA184767624797d92c1a93483c9632514f9b7324e99
SHA25672f092764c88a01a410927f53cc894ecb3523c9f7ddc128e2ca622b3f24b8a69
SHA512f952494885cc1b46f9b816dee8858d3596aad8077282eb34320b9cabceba6acb81ca9746a15ad611231cf1ac7fddf39440e1dc9fa0acdc012e5161c67cbcebd8