Overview
overview
10Static
static
100c3b09213f...3c.exe
windows7-x64
80dab0428b4...50.exe
windows7-x64
1014d09a259f...32.exe
windows7-x64
1016c49d6775...56.exe
windows7-x64
71d241bd0b7...f4.exe
windows7-x64
92.exe
windows7-x64
6287a6b75d1...ad.exe
windows7-x64
1035b0676421...82.exe
windows7-x64
1039deb2f02f...9f.exe
windows7-x64
84.exe
windows7-x64
74a0f399840...33.exe
windows7-x64
105.exe
windows7-x64
853bdaf567e...fc.exe
windows7-x64
76.exe
windows7-x64
5646677375b...36.exe
windows7-x64
96dfb9490b1...f8.exe
windows7-x64
67.exe
windows7-x64
1071a20e2700...db.exe
windows7-x64
3835b0ef8f5...35.exe
windows7-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b15b78937c...ac.exe
windows7-x64
7$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows7-x64
3b3dc1bb1c7...1b.exe
windows7-x64
5b4e3091d31...81.exe
windows7-x64
10c1b35d3d70...c3.exe
windows7-x64
10caa5f52a78...78.exe
windows7-x64
10d2878de61f...0b.exe
windows7-x64
7dbadeff4af...30.exe
windows7-x64
10f5d893afc4...e9.exe
windows7-x64
9Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Behavioral task
behavioral1
Sample
0c3b09213f642af5d6bca1708d167052f7fe198e5eced0e78584d8eb910b8d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dab0428b414b0440288a12fbc20dab72339ef72ff5859e8c18d76dd8b169f50.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
16c49d677559071b3fc71fb4bb1a3c85cdcf7c4c27454010f69bb0bd04b1c456.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
1d241bd0b71408abcf11871a9318cbfcd925b195814951c3123abca27554c6f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
287a6b75d1776f89502a1fd0ec571adebff878becb0ebdcec703e8fc6e3885ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
35b067642173874bd2766da0d108401b4cf45d6e2a8b3971d95bf474be4f6282.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
39deb2f02fee04a430cff446b35b0984a66b563552775eb1309d35acca3a209f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
4a0f399840bb73f3b70d4461ec1a37cffcb3e4789c876042d133ed903c5d9333.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
53bdaf567e302201ef06847d8914477e9a3852fc57d8e50606eab6bcdbdda8fc.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
646677375bc0ecaad279751d8d09220d5d44e20570548f8475f36803affda636.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
7.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
835b0ef8f5cfdc2ca8c0d3deccbafc48604e4a5356f0104cedfdfa20b20c2735.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
b15b78937cd33dfaedef28385b293c92b999f37b2a97d01d516f6189a6afefac.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b3dc1bb1c72c6bda1a7508147b2c92021aa18eb99d419db7e8245f32979cd01b.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
b4e3091d3119268dfc8ac3caf2d5d02fd4faa360f822a87b50110b805e465181.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c1b35d3d70c59a66a35ab7e4981ee3459571af1e43997a334bac1c073485fec3.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
caa5f52a7811c49ae830606f01fd70d846fe53e9858603886f504e984fb2bc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
d2878de61ff17b2ae8cd556a6935af332955f07acf1991ab30ddeba9a5ced20b.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dbadeff4af3fa7785d54d177db9608f24d405971cf642ca0759a203d9e895930.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f5d893afc4ad2e98606b597df186657b57f3d1e3a5abe51f800de6086aab84e9.exe
Resource
win7-20240903-en
General
-
Target
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe
-
Size
164KB
-
MD5
7518ecf9cd7d3f204de349103bd95c54
-
SHA1
417df7e036285c9409affa1e9bef8634d8994869
-
SHA256
14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632
-
SHA512
71a181e597a5d9eae8ccd22683b650039f2506ba502b44a2da4f786e8884a1538603df9ab57d19c78d9777cb8f643ec78439346c32611776984acc569dbaba32
-
SSDEEP
3072:FHixaVZFiOCDJtOicNDWEzZQjnS2C/vbgnB:FHigLF5CCj5zZQDV0bq
Malware Config
Extracted
C:\Users\290c2060pyWannadie.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E165FF99A258BAE6
http://decryptor.top/E165FF99A258BAE6
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\A: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\K: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\L: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\N: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\Q: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\R: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\V: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\Y: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\D: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\X: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\B: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\E: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\J: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\O: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\P: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\S: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\U: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\Z: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\G: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\H: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\I: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\M: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\T: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened (read-only) \??\F: 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\r568944o54c6.bmp" 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification \??\c:\program files\ConfirmUnprotect.html 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\GetWatch.rtf 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\GroupResolve.docx 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\RegisterStep.xla 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\UnpublishRestore.easmx 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\AddRead.M2T 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\ConvertFromDisconnect.mpg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\ExitUse.svg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\JoinResume.wvx 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\UnregisterComplete.aiff 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\LimitPop.mht 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\PublishSet.M2V 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\SplitStop.nfo 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\TraceDeny.zip 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\CompletePush.ttc 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\ConnectSave.ogg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\UnpublishMerge.mpeg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\290c2060pyWannadie.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\BackupEdit.xhtml 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\EnterUnprotect.vb 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\HideSet.vsd 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\InstallReset.ps1xml 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\SplitMove.dib 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\290c2060pyWannadie.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\DisconnectRevoke.mid 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\SkipFormat.ini 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\UseBackup.ogg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File created \??\c:\program files\290c2060pyWannadie.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File created \??\c:\program files (x86)\290c2060pyWannadie.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\SuspendExit.pps 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\290c2060pyWannadie.txt 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\CloseProtect.docx 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\MeasureSearch.wmv 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\OpenRepair.xml 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\RestoreUnprotect.xht 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification \??\c:\program files\UnblockSelect.jpg 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..pwindowmanager-core_31bf3856ad364e35_6.1.7601.17514_none_ebc99983d3d18578_microsoft-windows-desktopwindowmanager-core-ppdlic.xrm-ms_c6fa9375 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..rk-msimtf.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_e375db266beb6cc1_msimtf.dll.mui_e40b8b25 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-duser.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_a3d716fd41699423.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shacct.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_05b5021d1c212c08.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft.windows.winhttp.resources_31bf3856ad364e35_6.0.7600.16385_fr-fr_dfc46d1d99f9c2e6.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-v..skservice.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d0b77acd0b184bdb_vds.exe.mui_2268d934 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-eventlog-api.resources_31bf3856ad364e35_6.1.7600.16385_es-es_7f96ef3e715b63ea.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2cd61650c375bd11_vdsutil.dll.mui_0caf9b0e 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..ronment-dvd-bootfix_31bf3856ad364e35_6.1.7600.16385_none_7157b258f5bac0c5.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_57ee6a4218527f7e.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.1.7601.17727_none_6e30004a126a8db7.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-pshed.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_c23ae2f697bdf562_pshed.dll.mui_d7f9a40f 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_lv-lv_1c1ab4ee16bcc640.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft.windows.s..rt_driver.resources_31bf3856ad364e35_6.1.7600.16385_de-de_040354651b707cc9.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7600.16385_es-es_cb31547d0a230c7b_unlodctr.exe.mui_53acc4d0 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-newdev.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_1564d79270d6651c.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-rasserver.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_ac18c667d7c3743b_iprtrmgr.dll.mui_eb023b92 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-bcrypt-primitives-dll_31bf3856ad364e35_6.1.7600.16385_none_1207cf88785de24d_bcryptprimitives.dll_5dcb347c 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-network-security_31bf3856ad364e35_6.1.7601.17514_none_2b4a7558412a624a_fwpuclnt.dll_d0a74ee5 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-searchfolder.resources_31bf3856ad364e35_6.1.7600.16385_it-it_65f72bbfefe353cf_searchfolder.dll.mui_8c30bdaf 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-crypt32-dll.resources_31bf3856ad364e35_6.1.7600.16385_en-us_cdfd33b21b9a0a10.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_zh-tw_e99ba0bb58b4fbd1.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_91706225b47c99f7.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-ntvdm-vdmdbg_31bf3856ad364e35_6.1.7600.16385_none_4ea374e2e5067833.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-shell32_31bf3856ad364e35_6.1.7601.17514_none_ca4f304d289b7800_apps.inf_0b7d7d89 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-o..ct-picker.resources_31bf3856ad364e35_6.1.7600.16385_es-es_c293505da9a63d17_objsel.dll.mui_9b915792 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-m..ents-mdac.resources_31bf3856ad364e35_6.1.7600.16385_es-es_37da4de470bd3352_odbcjet.chm_2a003207 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-e..rtingcore.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8f94aa63624b0ac8.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_cs-cz_97769b281ba398b8.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..-truetype-aparajita_31bf3856ad364e35_6.1.7601.17514_none_d123c185ad71f4d5_aparaj.ttf_789944a5 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_6.1.7601.17514_fr-fr_b35e5a8cb554f3c8_iscsicli.exe.mui_64c0a23c 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-cryptui-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_05699821fc9b6205.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-embedding_31bf3856ad364e35_6.1.7601.17514_none_13e628b635935244_t2embed.dll_66e8486f 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_6.1.7600.16385_it-it_a9d4566c54c223de.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-msxml60.resources_31bf3856ad364e35_6.1.7600.16385_en-us_3bdcee47d56ca31c.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_de-de_9c4b10f07cfccf53.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-wmpdui.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_1bf590f3721a2457.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-legacyhwui.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_7fbbc48c58566606.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_pt-br_87b52f7be0d642ee_mlang.dll.mui_2904864a 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_6.1.7600.16385_it-it_9b553d0b8f9855ac_iscsiexe.dll.mui_7d81b1cc 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-u..em-config.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_9038f177d74f2f88_uicom.dll.mui_4fdc61f8 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ure-ws232.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f6af37a668d4e2e9.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-fixed_31bf3856ad364e35_6.1.7600.16385_none_db04d3f548508fd9.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-profsvc.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_f1814dbfdb6aeac1_userprofilewmiprovider.mfl_b1cb99f9 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-uxtheme.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c9241b147178dc55_uxtheme.dll.mui_15ce9297 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_6.1.7600.16385_it-it_fffad235455db1eb.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..anagement.resources_31bf3856ad364e35_6.1.7600.16385_en-us_05194bb98bbf5a4b.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-wmpdui.resources_31bf3856ad364e35_6.1.7600.16385_es-es_793e1af47f480df5_wmpdui.dll.mui_92411657 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_de-de_31dc108b13bfe951_bootmgfw.efi.mui_a6e78cfa 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_da-dk_a2ffc87595d912be_comdlg32.dll.mui_ac8e62f4 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-homegroup-listsvc_31bf3856ad364e35_6.1.7601.17514_none_cccd5bf59125cedc_listsvc.dll_c76b1498 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-irdaircomm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_552ff139ad4f66bd.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..-infrastructure-bsp_31bf3856ad364e35_6.1.7601.17514_none_16795c7543eb48cf.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-webservices.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c1bb3b50a112e8e7.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_sv-se_8a63f7a6bd8df93f.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a96db6468fda66c8_scksp.dll.mui_05f14191 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_lv-lv_1c1ab4ee16bcc640_msimsg.dll.mui_72e8994f 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..libraries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_d869760728e52d38.manifest 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_6.1.7601.17514_none_fed8c13f0d90a8cf_wmisvc.dll_e91705b5 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_networking-mpssvc-svc_31bf3856ad364e35_6.1.7601.17514_none_f83a40e7de7c47da_mpsdrv.mof_778760bc 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-fat_31bf3856ad364e35_6.1.7600.16385_none_0aa81d2771152f86_fastfat.sys_0ffee946 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_6.1.7601.17514_fr-fr_cba169dd0daf0482_winlogon.exe.mui_3280fc46 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-smss_31bf3856ad364e35_6.1.7600.16385_none_128443f66743685c_apisetschema.dll_d4a833e3 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..d-bootfix.resources_31bf3856ad364e35_6.1.7600.16385_de-de_4d08ffffd9f8bb31_bootfix.bin_ee6f205e 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 904 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2836 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe 2936 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2936 powershell.exe Token: SeBackupPrivilege 2752 vssvc.exe Token: SeRestorePrivilege 2752 vssvc.exe Token: SeAuditPrivilege 2752 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2936 2836 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe 30 PID 2836 wrote to memory of 2936 2836 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe 30 PID 2836 wrote to memory of 2936 2836 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe 30 PID 2836 wrote to memory of 2936 2836 14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe"C:\Users\Admin\AppData\Local\Temp\14d09a259f72569f309fdd7bc14519753d01016706c7b9335a215b2d0b64c632.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2596
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\290c2060pyWannadie.txt1⤵
- Opens file in notepad (likely ransom note)
PID:904
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57d3bed7e6478161da7bb7e1ae7224cd3
SHA191ec8c363ba349e407341477c50086cf44223b95
SHA25630afbc6d45e2ab3e040446cabea68b80e8121b907064b95b17a8023be52d5130
SHA512797cf1f64e7998edd113afc53fad52a15133a62c7951aae3e1cdc556fa280c964171ad8ee28aa821b20468a8f488cda176a5edf0931b0b8da0c352139293d881
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b