Resubmissions
31-01-2025 15:30
250131-sxp85azjcz 1014-01-2025 05:35
250114-gaenbszqam 1010-01-2025 23:50
250110-3vv2pswmhj 1011-12-2024 15:19
241211-sqgcmssnbr 1009-12-2024 01:54
241209-cbqprsxngx 1026-11-2024 23:15
241126-28wpqa1ndp 1030-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
v2.bin(1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
v2.bin(1).zip
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
v2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
v2.exe
Resource
win11-20241007-en
General
-
Target
v2.exe
-
Size
121KB
-
MD5
944ed18066724dc6ca3fb3d72e4b9bdf
-
SHA1
1a19c8793cd783a5bb89777f5bc09e580f97ce29
-
SHA256
74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f
-
SHA512
a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3
-
SSDEEP
1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY
Malware Config
Extracted
C:\Recovery\4q0lh535n-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/93DE79065EDE37A1
http://decoder.re/93DE79065EDE37A1
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\4q0lh535n-readme.txt v2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: v2.exe File opened (read-only) \??\H: v2.exe File opened (read-only) \??\I: v2.exe File opened (read-only) \??\K: v2.exe File opened (read-only) \??\M: v2.exe File opened (read-only) \??\U: v2.exe File opened (read-only) \??\V: v2.exe File opened (read-only) \??\X: v2.exe File opened (read-only) \??\Z: v2.exe File opened (read-only) \??\E: v2.exe File opened (read-only) \??\L: v2.exe File opened (read-only) \??\S: v2.exe File opened (read-only) \??\D: v2.exe File opened (read-only) \??\B: v2.exe File opened (read-only) \??\G: v2.exe File opened (read-only) \??\N: v2.exe File opened (read-only) \??\Q: v2.exe File opened (read-only) \??\R: v2.exe File opened (read-only) \??\T: v2.exe File opened (read-only) \??\W: v2.exe File opened (read-only) \??\J: v2.exe File opened (read-only) \??\O: v2.exe File opened (read-only) \??\P: v2.exe File opened (read-only) \??\Y: v2.exe File opened (read-only) \??\F: v2.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\t37pwx2.bmp" v2.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File opened for modification \??\c:\program files\RemoveExpand.m1v v2.exe File opened for modification \??\c:\program files\RemoveRegister.ogg v2.exe File opened for modification \??\c:\program files\TestDisconnect.wps v2.exe File opened for modification \??\c:\program files\UnregisterJoin.edrwx v2.exe File opened for modification \??\c:\program files\RegisterExit.3gp2 v2.exe File opened for modification \??\c:\program files\MountAdd.tif v2.exe File opened for modification \??\c:\program files\PopConvertTo.TS v2.exe File opened for modification \??\c:\program files\SwitchConvertTo.3g2 v2.exe File opened for modification \??\c:\program files\DisconnectStop.css v2.exe File opened for modification \??\c:\program files\ImportEdit.sql v2.exe File opened for modification \??\c:\program files\RemoveFormat.jpg v2.exe File opened for modification \??\c:\program files\StopConvertTo.docx v2.exe File opened for modification \??\c:\program files\ExpandRead.mov v2.exe File opened for modification \??\c:\program files\SubmitOpen.ram v2.exe File opened for modification \??\c:\program files\ExpandRevoke.docx v2.exe File opened for modification \??\c:\program files\NewConvertTo.xsl v2.exe File opened for modification \??\c:\program files\UnprotectBlock.au v2.exe File created \??\c:\program files (x86)\4q0lh535n-readme.txt v2.exe File opened for modification \??\c:\program files\GroupSearch.M2TS v2.exe File opened for modification \??\c:\program files\JoinInitialize.mhtml v2.exe File opened for modification \??\c:\program files\RedoUnblock.dwg v2.exe File opened for modification \??\c:\program files\ConvertInitialize.vbs v2.exe File opened for modification \??\c:\program files\GrantMount.jfif v2.exe File opened for modification \??\c:\program files\StepConfirm.mhtml v2.exe File opened for modification \??\c:\program files\SyncRemove.cfg v2.exe File opened for modification \??\c:\program files\DismountFormat.xltx v2.exe File opened for modification \??\c:\program files\ConvertToResume.avi v2.exe File opened for modification \??\c:\program files\DenyHide.inf v2.exe File opened for modification \??\c:\program files\LockStart.ods v2.exe File opened for modification \??\c:\program files\OutApprove.html v2.exe File opened for modification \??\c:\program files\RequestMount.M2T v2.exe File opened for modification \??\c:\program files\UpdateUse.M2TS v2.exe File created \??\c:\program files\4q0lh535n-readme.txt v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5200 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe 4576 v2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4576 v2.exe Token: SeTakeOwnershipPrivilege 4576 v2.exe Token: SeBackupPrivilege 3680 vssvc.exe Token: SeRestorePrivilege 3680 vssvc.exe Token: SeAuditPrivilege 3680 vssvc.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe 2760 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2760 wrote to memory of 5200 2760 OpenWith.exe 110 PID 2760 wrote to memory of 5200 2760 OpenWith.exe 110 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2716
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\MergeExit.M2V.4q0lh535n2⤵
- Opens file in notepad (likely ransom note)
PID:5200
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\4q0lh535n-readme.txt1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a3a93b226a531ebef002ccc22096b84d
SHA14946bb2ff453a66fba26409a0ef93671735e1760
SHA256ad48b78d56e0de00347c0977da8f51429d427ef5460dc1755fb7051a2b2d4fb8
SHA5128c2b4acb8da6ae456f7f27d1f60e558f6f3c2358d73835d6d3c4b567e9d9efb82e1fcab0ea93dd288f1d149d9f5613eb4b0e436c8dba9b18834bd057e75fbf9d
-
Filesize
661KB
MD5ecb9918dc82a16cc96003818914b91dc
SHA183a522e80a11f90060c3008f7fa9ce615d116b98
SHA256bc573d7403377a6d6a9f6538b604bca8a0f6c5046ec1287c4117bb959241e96a
SHA512c254def55a733cc5681fe16fe5118ba60dd963d0d9998f14586bb4f388094333cc1883d5d59f6b7cc9b83ebb09cdba2bb626a90a5bd1d5840c75729900ae4fcf