Malware Analysis Report

2025-01-18 18:19

Sample ID 241213-zjezkaznfp
Target malware_005D0000.bin
SHA256 5f56d5748940e4039053f85978074bde16d64bd5ba97f6f0026ba8172cb29e93
Tags
sodinokibi discovery ransomware spyware stealer 5 367 defense_evasion execution impact
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5f56d5748940e4039053f85978074bde16d64bd5ba97f6f0026ba8172cb29e93

Threat Level: Known bad

The file malware_005D0000.bin was found to be: Known bad.

Malicious Activity Summary

sodinokibi discovery ransomware spyware stealer 5 367 defense_evasion execution impact

Sodinokibi family

Sodinokibi/Revil sample

Sodin,Sodinokibi,REvil

Deletes shadow copies

Reads user/profile data of web browsers

Checks computer location settings

Enumerates connected drives

Sets desktop wallpaper using registry

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Interacts with shadow copies

Uses Volume Shadow Copy service COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-13 20:44

Signatures

Sodinokibi family

sodinokibi

Sodinokibi/Revil sample

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-13 20:44

Reported

2024-12-13 20:47

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Sodinokibi family

sodinokibi

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\y145l0.bmp" C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification \??\c:\program files\RequestExport.emf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ResetWait.nfo C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UndoUnprotect.xht C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files\5uh58-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\CloseUnblock.tif C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\CloseUnregister.wmv C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ConnectConvert.vssm C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\InitializePop.edrwx C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ResetRead.rar C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\RevokeCompare.temp C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\SelectSet.mp4 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UnregisterJoin.M2T C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\5uh58-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ExitUnlock.xla C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\SuspendMeasure.vsdx C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\EditRevoke.ogg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\RestoreGroup.dxf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\SetLimit.reg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\TraceUnlock.odt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ConvertToDebug.ADTS C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\MountTrace.reg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\StopComplete.ogg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UninstallMount.ttf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\PublishUninstall.php C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\RequestPublish.wps C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ExportDismount.mpeg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ResetSave.vsdx C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\DismountGroup.cr2 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\RevokeEnter.mpv2 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UpdateDismount.htm C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_509c290d28f760ee_sdbinst.exe.mui_258ad624 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_pt-br_366538e4f4fe7289.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..-usermode.resources_31bf3856ad364e35_10.0.19041.1_it-it_09805d42c133e875_wudfpf.sys.mui_f61e9e86 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1202_en-us_d882497830128342_userdeviceregistration.ngc.dll.mui_d2c6ca95 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_fr-ca_43eaf76475822ccb.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..sition-coreservices_31bf3856ad364e35_10.0.19041.450_none_107cae8412302d3e_wiarpc.dll_5aecac54 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1202_en-us_e2d6f3ca6473453d.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.264_qps-ploc_5fe0c6cc0fbfcd94.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-codeintegrity_31bf3856ad364e35_10.0.19041.1_none_5668fec1a41d6ac1.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_ru-ru_c05026eaafcf5a72_memtest.exe.mui_77b8cbcc C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_de-de_8bd82c67996c6925_bootmgfw.efi.mui_a6e78cfa C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_es-es_34945f448871668f_bootmgfw.efi.mui_a6e78cfa C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.19041.1_none_3947da6a963cb0d8_vgas874.fon_57846913 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ndis-minwin_31bf3856ad364e35_10.0.19041.1151_none_ce259344dd35ac79.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-e..storage-classdriver_31bf3856ad364e35_10.0.19041.1_none_13e0a2d70bde69d7.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_ega80852.fon_608992fb C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..-credprov.resources_31bf3856ad364e35_10.0.19041.1_es-es_9e7575a7f032231a_fidocredprov.dll.mui_4ca89266 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smartcardsubsystem_31bf3856ad364e35_10.0.19041.844_none_f5f48bc2c8c3f7a0_certprop.dll_0b11a6d7 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..sition-coreservices_31bf3856ad364e35_10.0.19041.450_none_107cae8412302d3e_wiatrace.dll_dfb4e972 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_a12ed8363e5ee46c_gpsvc.dll.mui_0c160ac2 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-network-qos-pacer_31bf3856ad364e35_10.0.19041.546_none_cb01ee53d6697641_wshqos.dll_f1749d15 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.19041.1_en-us_a9b6dfbebdc913fa_scardsvr.dll.mui_5f6fb64f C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-transactionmanagerapi_31bf3856ad364e35_10.0.19041.1_none_171d07e1a7b66413.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..ient-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6fb6e6e49393acae.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-shlwapi_31bf3856ad364e35_10.0.19041.1_none_afcabf88440c71c5.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-crypt32-dll_31bf3856ad364e35_10.0.19041.1202_none_d02feec5930a1e75.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_2d3b6ea159ff4dae_mofd.dll.mui_793ef98d C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_lv-lv_4233ec731487e2dc.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-deviceguard-gpext_31bf3856ad364e35_10.0.19041.546_none_48d6c53e575a9a81_dggpext.dll_0c91d307 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.19041.1165_none_1ea3d2b20faf7de3_dciman32.dll_a41dd515 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ertificates-utility_31bf3856ad364e35_10.0.19041.1_none_3eeeb9b5ca0761f9_fvecerts.dll_cca35228 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-win32kbase_31bf3856ad364e35_10.0.19041.1288_none_233dec521bed18a8_win32kbase.sys_cb97ed72 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-atl_31bf3856ad364e35_10.0.19041.1_none_6b65f79c2d70b55d.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1023_ja-jp_ed3ea94a706110ba.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f94194299c1afcc8.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1_de-de_70c254192b5ba65d_userdeviceregistration.ngc.dll.mui_d2c6ca95 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_zh-tw_dab1b6fa435d154d.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appidcore_31bf3856ad364e35_10.0.19041.1202_none_a391067a6b9b433c_applockercsp.dll_771a831b C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-dui70_31bf3856ad364e35_10.0.19041.746_none_35adfa9d5cea0bbc_dui70.dll_5f097b0b C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-eventlog.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_f67aaff953259297.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-fixed_31bf3856ad364e35_10.0.19041.1_none_3500efd1cdfd0fad_8514fix.fon_dc96978e C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-profapi-onecore_31bf3856ad364e35_10.0.19041.844_none_e413cef1d5bfa747_profapi.dll_d55ae499 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_zh-tw_984baa246cdd2b6c.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6_ntlmshared.dll_d7ed706e C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..ient-core.resources_31bf3856ad364e35_10.0.19041.1_it-it_46f2a11d47bb9cf8.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-security-spp_31bf3856ad364e35_10.0.19041.1_none_daa70f4df4b13b5c.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-windowsuiimmersive_31bf3856ad364e35_10.0.19041.1202_none_a690000a893f966b_windows.ui.immersive.dll.mun_6e49d10e C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-appidcore_31bf3856ad364e35_10.0.19041.1081_none_ae0369bc9fe47e6c_applockercsp.dll_771a831b C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-eventlog-api_31bf3856ad364e35_10.0.19041.1266_none_2b4b7ff44edc4a8b_wevtapi.dll_df064540 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-userpowermanagement_31bf3856ad364e35_10.0.19041.1_none_635f5636d096a7e7.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-ldap-client_31bf3856ad364e35_10.0.19041.546_none_db8a38e9e99bc04d_wldap32.dll_09c99dc1 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-f..etype-lucidaconsole_31bf3856ad364e35_10.0.19041.1_none_b537ffbd18185517.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_456f73b36cb7b8b5.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..erservice.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_493b5718242b0bd3_umpo.dll.mui_cac12e54 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_10.0.19041.1202_none_de8b08e5f31655d7.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-d2d_31bf3856ad364e35_10.0.19041.546_none_8fead816ef2105a4.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1_es-es_23d331484ec165c2_dsregtask.dll.mui_5e1b9353 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_fr-fr_b59136bc7aa040e6_comctl32.dll.mui_0da4e682 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_app775.fon_dec57409 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_10.0.19041.1_es-es_029f7959ec5608b5.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-twinapi_31bf3856ad364e35_10.0.19041.1202_none_301d5c0e1bd4c77b.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-virtualdiskservice_31bf3856ad364e35_10.0.19041.1202_none_dfaaff89afe4f3d4.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_es-es_8a83f8a2672d374c_wmiapres.dll.mui_c1b8803f C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-appid.resources_31bf3856ad364e35_10.0.19041.1_en-us_ec1b96874c384b44.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2340 wrote to memory of 3404 N/A C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe C:\Windows\SysWOW64\cmd.exe
PID 2340 wrote to memory of 3404 N/A C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe C:\Windows\SysWOW64\cmd.exe
PID 2340 wrote to memory of 3404 N/A C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe

"C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 craftingalegacy.com udp
US 50.87.137.113:443 craftingalegacy.com tcp
US 8.8.8.8:53 g2mediainc.com udp
DE 78.46.1.42:443 g2mediainc.com tcp
US 8.8.8.8:53 brinkdoepke.eu udp
DE 92.205.192.141:443 brinkdoepke.eu tcp
US 8.8.8.8:53 vipcarrental.ae udp
US 104.21.40.147:443 vipcarrental.ae tcp
US 8.8.8.8:53 113.137.87.50.in-addr.arpa udp
US 8.8.8.8:53 141.192.205.92.in-addr.arpa udp
US 8.8.8.8:53 42.1.46.78.in-addr.arpa udp
US 8.8.8.8:53 147.40.21.104.in-addr.arpa udp
US 8.8.8.8:53 autoteamlast.de udp
DE 37.202.7.169:443 autoteamlast.de tcp
US 8.8.8.8:53 169.7.202.37.in-addr.arpa udp
US 8.8.8.8:53 hostastay.com udp
SG 13.229.198.152:443 hostastay.com tcp
US 8.8.8.8:53 gavelmasters.com udp
US 8.8.8.8:53 ronaldhendriks.nl udp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
US 8.8.8.8:53 successcolony.com.ng udp
US 8.8.8.8:53 medicalsupportco.com udp
US 3.33.251.168:443 medicalsupportco.com tcp
US 3.33.251.168:443 medicalsupportco.com tcp
US 3.33.251.168:443 medicalsupportco.com tcp
US 8.8.8.8:53 kompresory-opravy.com udp
SK 37.9.175.133:443 kompresory-opravy.com tcp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 188.16.103.185.in-addr.arpa udp
US 8.8.8.8:53 168.251.33.3.in-addr.arpa udp
US 8.8.8.8:53 sveneulberg.de udp
US 8.8.8.8:53 133.175.9.37.in-addr.arpa udp
DE 89.110.179.179:443 sveneulberg.de tcp
US 8.8.8.8:53 www.sveneulberg.de udp
DE 89.110.179.179:443 www.sveneulberg.de tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 oththukaruva.com udp
US 8.8.8.8:53 voetbalhoogeveen.nl udp
US 8.8.8.8:53 selected-minds.de udp
DE 217.160.0.92:443 selected-minds.de tcp
US 8.8.8.8:53 179.179.110.89.in-addr.arpa udp
US 8.8.8.8:53 log-barn.co.uk udp
GB 213.175.208.90:443 log-barn.co.uk tcp
US 8.8.8.8:53 92.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 fsbforsale.com udp
US 8.8.8.8:53 jobkiwi.com.ng udp
US 8.8.8.8:53 ivancacu.com udp
DE 217.160.0.237:443 ivancacu.com tcp
US 8.8.8.8:53 11.in.ua udp
UA 91.225.81.9:443 11.in.ua tcp
US 8.8.8.8:53 90.208.175.213.in-addr.arpa udp
US 8.8.8.8:53 237.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 irizar.com udp
ES 194.30.99.95:443 irizar.com tcp
US 8.8.8.8:53 www.irizar.com udp
ES 194.30.99.95:443 www.irizar.com tcp
US 8.8.8.8:53 colored-shelves.com udp
US 8.8.8.8:53 soundseeing.net udp
DE 85.13.155.183:443 soundseeing.net tcp
US 8.8.8.8:53 9.81.225.91.in-addr.arpa udp
US 8.8.8.8:53 95.99.30.194.in-addr.arpa udp
US 8.8.8.8:53 scotlandsroute66.co.uk udp
US 172.67.204.127:443 scotlandsroute66.co.uk tcp
US 8.8.8.8:53 hawaiisteelbuilding.com udp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 8.8.8.8:53 183.155.13.85.in-addr.arpa udp
US 8.8.8.8:53 127.204.67.172.in-addr.arpa udp
US 8.8.8.8:53 mindfuelers.com udp
US 172.67.183.252:443 mindfuelers.com tcp
US 8.8.8.8:53 dentourage.com udp
US 8.8.8.8:53 213.172.16.199.in-addr.arpa udp
US 8.8.8.8:53 252.183.67.172.in-addr.arpa udp
US 8.8.8.8:53 hekecrm.com udp
CN 38.14.23.10:443 hekecrm.com tcp
US 8.8.8.8:53 finsahome.co.uk udp
DE 217.160.0.87:443 finsahome.co.uk tcp
US 8.8.8.8:53 cormanmarketing.com udp
US 34.174.215.122:443 cormanmarketing.com tcp
US 8.8.8.8:53 87.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 122.215.174.34.in-addr.arpa udp
US 8.8.8.8:53 morgansconsult.com udp
GB 35.214.25.158:443 morgansconsult.com tcp
US 8.8.8.8:53 dnqa.co.uk udp
US 107.178.223.183:443 dnqa.co.uk tcp
US 8.8.8.8:53 frimec-international.es udp
FR 188.165.33.133:443 frimec-international.es tcp
US 8.8.8.8:53 www.frimec-international.es udp
US 8.8.8.8:53 183.223.178.107.in-addr.arpa udp
US 8.8.8.8:53 158.25.214.35.in-addr.arpa udp
US 8.8.8.8:53 133.33.165.188.in-addr.arpa udp
FR 188.165.33.133:443 www.frimec-international.es tcp
US 8.8.8.8:53 worldproskitour.com udp
US 143.198.7.126:443 worldproskitour.com tcp
US 8.8.8.8:53 126.7.198.143.in-addr.arpa udp
US 8.8.8.8:53 csaballoons.com udp
CA 149.56.43.78:443 csaballoons.com tcp
US 8.8.8.8:53 78.43.56.149.in-addr.arpa udp
US 8.8.8.8:53 krishnabrawijaya.com udp
US 8.8.8.8:53 tatyanakopieva.ru udp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
US 8.8.8.8:53 195.40.222.77.in-addr.arpa udp
US 8.8.8.8:53 silkeight.com udp
RO 188.213.19.166:443 silkeight.com tcp
US 8.8.8.8:53 166.19.213.188.in-addr.arpa udp
US 8.8.8.8:53 publicompserver.de udp
DE 195.3.195.201:443 publicompserver.de tcp
US 8.8.8.8:53 letsstopsmoking.co.uk udp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
US 8.8.8.8:53 201.195.3.195.in-addr.arpa udp
US 8.8.8.8:53 149.18.182.62.in-addr.arpa udp
US 8.8.8.8:53 anleggsregisteret.no udp
NO 185.157.56.11:443 anleggsregisteret.no tcp
US 8.8.8.8:53 arearugcleaningnyc.com udp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 8.8.8.8:53 11.56.157.185.in-addr.arpa udp
US 8.8.8.8:53 142.17.178.108.in-addr.arpa udp
US 8.8.8.8:53 diverfiestas.com.es udp
FR 176.31.163.21:443 diverfiestas.com.es tcp
US 8.8.8.8:53 lovcase.com udp
US 8.8.8.8:53 alltagsrassismus-entknoten.de udp
DE 91.210.225.23:443 alltagsrassismus-entknoten.de tcp
US 8.8.8.8:53 21.163.31.176.in-addr.arpa udp
US 8.8.8.8:53 www.alltagsrassismus-entknoten.de udp
DE 91.210.225.23:443 www.alltagsrassismus-entknoten.de tcp
US 8.8.8.8:53 lassocrm.com udp
US 209.87.149.78:443 lassocrm.com tcp
US 8.8.8.8:53 23.225.210.91.in-addr.arpa udp
US 8.8.8.8:53 boyfriendsgoal.site udp
US 8.8.8.8:53 mbuildinghomes.com udp
US 104.21.112.1:443 mbuildinghomes.com tcp
US 8.8.8.8:53 78.149.87.209.in-addr.arpa udp
US 8.8.8.8:53 santastoy.store udp
US 8.8.8.8:53 citiscapes-art.com udp
US 104.21.21.241:443 citiscapes-art.com tcp
US 8.8.8.8:53 unislaw-narty.pl udp
PL 91.185.184.170:443 unislaw-narty.pl tcp
US 8.8.8.8:53 1.112.21.104.in-addr.arpa udp
US 8.8.8.8:53 241.21.21.104.in-addr.arpa udp
US 8.8.8.8:53 envomask.com udp
US 172.81.116.97:443 envomask.com tcp
US 8.8.8.8:53 170.184.185.91.in-addr.arpa udp
US 8.8.8.8:53 patassociation.com udp
FR 109.234.160.199:443 patassociation.com tcp
US 8.8.8.8:53 luvbec.com udp
US 172.232.25.148:443 luvbec.com tcp
US 8.8.8.8:53 keuken-prijs.nl udp
US 8.8.8.8:53 therapybusinessacademy.com udp
DE 217.160.0.95:443 therapybusinessacademy.com tcp
US 8.8.8.8:53 97.116.81.172.in-addr.arpa udp
US 8.8.8.8:53 199.160.234.109.in-addr.arpa udp
US 8.8.8.8:53 148.25.232.172.in-addr.arpa udp

Files

C:\Users\5uh58-readme.txt

MD5 59ea7fdd4633e50fdfe0ce7b775654a0
SHA1 509f8a16445e32f9341c8aa3edccdb7fceec9814
SHA256 dcf5edf8eba37cc7111b62b9a992ec8e097fc3bf6875a93ef5ed06a4aa50b1c5
SHA512 59ad3f42bf691ebbd4d28db16e9fa56624342e277c376a5ba6ff734a58c54f19271c369a90c2c76804f4c3f49f505f78459a676e8b7ea9f0abeaba3dd22f2607

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-13 20:44

Reported

2024-12-13 20:47

Platform

win7-20240708-en

Max time kernel

130s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Sodinokibi family

sodinokibi

Deletes shadow copies

ransomware defense_evasion impact execution

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\li1.bmp" C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification \??\c:\program files\PingProtect.M2T C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\WaitInitialize.wav C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\lnb2t8g7-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\lnb2t8g7-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\HidePublish.001 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\TraceCopy.ppsm C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\CompletePublish.mpg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\EnterRedo.zip C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\WriteAdd.asf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\lnb2t8g7-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ClearJoin.easmx C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\MeasureUnregister.mp2v C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\OpenApprove.dwg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\SplitExport.kix C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\WriteProtect.ttf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\LockUse.pdf C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\SearchUnlock.nfo C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\ShowMeasure.mov C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files\lnb2t8g7-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\RestoreMerge.ogg C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UnblockUnregister.wmv C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\InitializeExport.vstm C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\FindMeasure.mht C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\lnb2t8g7-readme.txt C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UnlockCheckpoint.search-ms C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification \??\c:\program files\UnregisterRemove.iso C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..etype-sakkalmajalla_31bf3856ad364e35_6.1.7600.16385_none_fb8092e2c0173c39.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..owmanager.resources_31bf3856ad364e35_6.1.7600.16385_es-es_05b98a45d5a86346_dwmcore.dll.mui_ebf60d96 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_he-il_49429473d09ea38c_comctl32.dll.mui_0da4e682 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_en-us_06eae3639ce15ec1.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ck-legacy.resources_31bf3856ad364e35_6.1.7600.16385_en-us_a7b0ad52b3bcfdb6_wsock32.dll.mui_18b23987 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-imm32_31bf3856ad364e35_6.1.7601.17514_none_c4d0cdd7c56b493e.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_6.1.7600.16385_es-es_d2590890fddbcebf_winload.exe.mui_3bc5b827 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..owmanager.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a8710044c87a79a8_dwmcore.dll.mui_ebf60d96 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasbase-ndiswan_31bf3856ad364e35_6.1.7601.17514_none_515e96306dea528f.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_es-es_62d4dbcb5565c19c_scksp.dll.mui_05f14191 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_it-it_12c3c2213e4d32d4.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-com-base.resources_31bf3856ad364e35_6.1.7600.16385_en-us_1474adc65759a4dd_oleres.dll.mui_ff00d4cb C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_hr-hr_a77de2d787af8188.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_6.1.7600.16385_none_70644a8bdb0d9303_ega40737.fon_5e5746b1 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..em-config.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_341a55f41ef1be52_mdminst.dll.mui_19a87063 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-w..eservices.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_0a2f4680d5ae26b7.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-dns-client.resources_31bf3856ad364e35_6.1.7600.16385_es-es_231366a72d1cda71_dnsapi.dll.mui_97465f8a C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..structure.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_26cee700b53a673d_sdbinst.exe.mui_258ad624 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-f..rcluster-clientcore_31bf3856ad364e35_6.1.7601.17514_none_934ef25796a1b53e.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_cs-cz_97769b281ba398b8.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..-microsoftsansserif_31bf3856ad364e35_6.1.7600.16385_none_850ef67c61bbadb6_micross.ttf_b13ae9de C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mssign32-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_48bc807ccad80bf9.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_en-us_e237947b2c7fb685.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-c..vider-dll.resources_31bf3856ad364e35_6.1.7600.16385_de-de_01d05823a99ac86b_certcredprovider.dll.mui_b5ad161e C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..stringime.resources_31bf3856ad364e35_6.1.7600.16385_en-us_e5ab11565b7c2b91.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_zh-tw_c622c1b2dbc95119.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-networkbridge_31bf3856ad364e35_6.1.7600.16385_none_63dee2821fc69fce_brdgcfg.dll_9efdd2e3 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasautodial_31bf3856ad364e35_6.1.7600.16385_none_6bcef05d7f04260a.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..resources.resources_31bf3856ad364e35_6.1.7600.16385_es-es_57456b8ac702a51c.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_6.1.7600.16385_en-us_14569492a0cb0c5e_samsrv.dll.mui_32250491 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mpr.resources_31bf3856ad364e35_6.1.7600.16385_en-us_ba5be41f9553aeb3.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7600.16385_de-de_227521a01b1e0f11_prflbmsg.dll.mui_4caa0054 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-htmlhelp_31bf3856ad364e35_6.1.7600.16385_none_244ae8599e6d81bb.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ents-mdac.resources_31bf3856ad364e35_6.1.7600.16385_de-de_84c970b54d5773ed_cliconf.chm_12e2bd62 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-time-service.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_517d915ca0c7b0ce_w32time.dll.mui_b382d4b4 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-t..-platform-libraries_31bf3856ad364e35_6.1.7601.17514_none_ec7854d0f990441d.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-crypt32-dll_31bf3856ad364e35_6.1.7601.17514_none_b995c74af473511b.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp_31bf3856ad364e35_6.1.7600.16385_none_2e9f92abd2ce43b6_hhctrl.ocx_38c869db C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-credui.resources_31bf3856ad364e35_6.1.7601.17514_es-es_63ed8c3a00aad07b_credui.dll.mui_34721171 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_6.1.7600.16385_es-es_1421f176a0f1fe03.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-e..rtingcore.resources_31bf3856ad364e35_6.1.7600.16385_en-us_02e9e13998201d43_erofflps.txt_649e76ed C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..edstorage.resources_31bf3856ad364e35_6.1.7600.16385_en-us_cef288146d0ec16c_psbase.dll.mui_c28690ab C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..structure.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_26cee700b53a673d_apphelp.dll.mui_59096153 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-efs-util-library_31bf3856ad364e35_6.1.7600.16385_none_46efb78b042229ec_efsutil.dll_19519f5a C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-cryptui-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_618833a5b4f8d33b.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-cryptui-dll.resources_31bf3856ad364e35_6.1.7601.17514_it-it_ee32fccf7f23c0c0.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_it-it_efb448111f69bd7c_basecsp.dll.mui_04bea7ac C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_6.1.7600.16385_de-de_766749e698668441.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-x..ollmentui.resources_31bf3856ad364e35_6.1.7600.16385_en-us_38b2b0e8fba01a4b.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_f5d83b1064d90ccb.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-e..orerframe.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3c186b53d67e9899_explorerframe.dll.mui_074caeb5 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-network-security_31bf3856ad364e35_6.1.7601.17514_none_2b4a7558412a624a_ikeext.dll_3ac4406c C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mpr.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e92c2c565299ae13.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-sendmail.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_91cbec40d69be922.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-dhcp-client-dll_31bf3856ad364e35_6.1.7601.17514_none_d961938b8cd1e885_dhcpcsvc.dll_8155446a C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-eventlog-api.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_c62fc9b9abd00916.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_6.1.7600.16385_de-de_ca5f33128c54b8a1.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_6.1.7600.16385_en-us_6084741c7167c84b.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_6.1.7600.16385_it-it_fffad235455db1eb_provsvc.dll.mui_3a2926ae C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-lua.resources_31bf3856ad364e35_6.1.7600.16385_it-it_d72a84d3502b0701_consent.exe.mui_2eb3b9db C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..-encoding.resources_31bf3856ad364e35_6.1.7600.16385_es-es_c464d2bacfbc42a4.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_4e286816448a8f66_bootmgr.exe.mui_c434701f C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_zh-hk_38fe497fea9b41b8_bootmgfw.efi.mui_a6e78cfa C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-e..e-library.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_9d2ef62bea869408.manifest C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\vssadmin.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe

"C:\Users\Admin\AppData\Local\Temp\malware_005D0000.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 craftingalegacy.com udp
US 50.87.137.113:443 craftingalegacy.com tcp
US 50.87.137.113:443 craftingalegacy.com tcp
US 8.8.8.8:53 g2mediainc.com udp
DE 78.46.1.42:443 g2mediainc.com tcp
US 8.8.8.8:53 brinkdoepke.eu udp
DE 92.205.192.141:443 brinkdoepke.eu tcp
DE 92.205.192.141:443 brinkdoepke.eu tcp
US 8.8.8.8:53 vipcarrental.ae udp
US 172.67.153.12:443 vipcarrental.ae tcp
US 8.8.8.8:53 autoteamlast.de udp
DE 37.202.7.169:443 autoteamlast.de tcp
DE 37.202.7.169:443 autoteamlast.de tcp
US 8.8.8.8:53 hostastay.com udp
SG 13.229.198.152:443 hostastay.com tcp
US 8.8.8.8:53 gavelmasters.com udp
US 8.8.8.8:53 ronaldhendriks.nl udp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
US 8.8.8.8:53 successcolony.com.ng udp
US 8.8.8.8:53 medicalsupportco.com udp
US 3.33.251.168:443 medicalsupportco.com tcp
US 3.33.251.168:443 medicalsupportco.com tcp
US 8.8.8.8:53 kompresory-opravy.com udp
SK 37.9.175.133:443 kompresory-opravy.com tcp
SK 37.9.175.133:443 kompresory-opravy.com tcp
US 8.8.8.8:53 sveneulberg.de udp
DE 89.110.179.179:443 sveneulberg.de tcp
DE 89.110.179.179:443 sveneulberg.de tcp
US 8.8.8.8:53 oththukaruva.com udp
US 8.8.8.8:53 voetbalhoogeveen.nl udp
US 8.8.8.8:53 selected-minds.de udp
DE 217.160.0.92:443 selected-minds.de tcp
DE 217.160.0.92:443 selected-minds.de tcp
US 8.8.8.8:53 log-barn.co.uk udp
GB 213.175.208.90:443 log-barn.co.uk tcp
GB 213.175.208.90:443 log-barn.co.uk tcp
US 8.8.8.8:53 fsbforsale.com udp
US 8.8.8.8:53 jobkiwi.com.ng udp
US 8.8.8.8:53 ivancacu.com udp
DE 217.160.0.237:443 ivancacu.com tcp
DE 217.160.0.237:443 ivancacu.com tcp
US 8.8.8.8:53 11.in.ua udp
UA 91.225.81.9:443 11.in.ua tcp
US 8.8.8.8:53 irizar.com udp
ES 194.30.99.95:443 irizar.com tcp
ES 194.30.99.95:443 irizar.com tcp
US 8.8.8.8:53 colored-shelves.com udp
US 8.8.8.8:53 soundseeing.net udp
DE 85.13.155.183:443 soundseeing.net tcp
DE 85.13.155.183:443 soundseeing.net tcp
US 8.8.8.8:53 scotlandsroute66.co.uk udp
US 104.21.58.148:443 scotlandsroute66.co.uk tcp
US 8.8.8.8:53 hawaiisteelbuilding.com udp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 8.8.8.8:53 mindfuelers.com udp
US 104.21.96.155:443 mindfuelers.com tcp
US 104.21.96.155:443 mindfuelers.com tcp
US 8.8.8.8:53 dentourage.com udp
US 8.8.8.8:53 hekecrm.com udp
CN 38.14.23.10:443 hekecrm.com tcp
US 8.8.8.8:53 finsahome.co.uk udp
DE 217.160.0.87:443 finsahome.co.uk tcp
DE 217.160.0.87:443 finsahome.co.uk tcp
US 8.8.8.8:53 cormanmarketing.com udp
US 34.174.215.122:443 cormanmarketing.com tcp
US 34.174.215.122:443 cormanmarketing.com tcp
US 8.8.8.8:53 morgansconsult.com udp
GB 35.214.25.158:443 morgansconsult.com tcp
GB 35.214.25.158:443 morgansconsult.com tcp
US 8.8.8.8:53 dnqa.co.uk udp
US 107.178.223.183:443 dnqa.co.uk tcp
US 8.8.8.8:53 frimec-international.es udp
FR 188.165.33.133:443 frimec-international.es tcp
US 8.8.8.8:53 worldproskitour.com udp
US 143.198.7.126:443 worldproskitour.com tcp
US 143.198.7.126:443 worldproskitour.com tcp
US 8.8.8.8:53 csaballoons.com udp
CA 149.56.43.78:443 csaballoons.com tcp
CA 149.56.43.78:443 csaballoons.com tcp
US 8.8.8.8:53 krishnabrawijaya.com udp
US 8.8.8.8:53 tatyanakopieva.ru udp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
US 8.8.8.8:53 silkeight.com udp
RO 188.213.19.166:443 silkeight.com tcp
RO 188.213.19.166:443 silkeight.com tcp
US 8.8.8.8:53 publicompserver.de udp
DE 195.3.195.201:443 publicompserver.de tcp
DE 195.3.195.201:443 publicompserver.de tcp
US 8.8.8.8:53 letsstopsmoking.co.uk udp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
US 8.8.8.8:53 anleggsregisteret.no udp
NO 185.157.56.11:443 anleggsregisteret.no tcp
NO 185.157.56.11:443 anleggsregisteret.no tcp
US 8.8.8.8:53 arearugcleaningnyc.com udp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 8.8.8.8:53 diverfiestas.com.es udp
FR 176.31.163.21:443 diverfiestas.com.es tcp
US 8.8.8.8:53 lovcase.com udp
US 8.8.8.8:53 alltagsrassismus-entknoten.de udp
DE 91.210.225.23:443 alltagsrassismus-entknoten.de tcp
DE 91.210.225.23:443 alltagsrassismus-entknoten.de tcp
US 8.8.8.8:53 lassocrm.com udp
US 209.87.149.78:443 lassocrm.com tcp
US 209.87.149.78:443 lassocrm.com tcp
US 8.8.8.8:53 boyfriendsgoal.site udp
US 8.8.8.8:53 mbuildinghomes.com udp
US 104.21.112.1:443 mbuildinghomes.com tcp
US 8.8.8.8:53 santastoy.store udp
US 8.8.8.8:53 citiscapes-art.com udp
US 172.67.201.110:443 citiscapes-art.com tcp
US 8.8.8.8:53 unislaw-narty.pl udp
PL 91.185.184.170:443 unislaw-narty.pl tcp
US 8.8.8.8:53 envomask.com udp
US 172.81.116.97:443 envomask.com tcp
US 172.81.116.97:443 envomask.com tcp
US 8.8.8.8:53 patassociation.com udp
FR 109.234.160.199:443 patassociation.com tcp
FR 109.234.160.199:443 patassociation.com tcp
US 8.8.8.8:53 luvbec.com udp
US 172.232.25.148:443 luvbec.com tcp
US 172.232.25.148:443 luvbec.com tcp
US 8.8.8.8:53 keuken-prijs.nl udp
US 8.8.8.8:53 therapybusinessacademy.com udp
DE 217.160.0.95:443 therapybusinessacademy.com tcp
DE 217.160.0.95:443 therapybusinessacademy.com tcp
US 8.8.8.8:53 baikalflot.ru udp
US 8.8.8.8:53 piestar.com udp
US 35.170.173.134:443 piestar.com tcp
US 35.170.173.134:443 piestar.com tcp
US 8.8.8.8:53 diakonie-weitramsdorf-sesslach.de udp
DE 78.46.133.97:443 diakonie-weitramsdorf-sesslach.de tcp
DE 78.46.133.97:443 diakonie-weitramsdorf-sesslach.de tcp
US 8.8.8.8:53 klapanvent.ru udp
RU 77.222.40.14:443 klapanvent.ru tcp
RU 77.222.40.14:443 klapanvent.ru tcp
US 8.8.8.8:53 fysiotherapierijnmond.nl udp
NL 178.128.138.113:443 fysiotherapierijnmond.nl tcp
NL 178.128.138.113:443 fysiotherapierijnmond.nl tcp
US 8.8.8.8:53 avis.mantova.it udp
IT 217.64.195.176:443 avis.mantova.it tcp
IT 217.64.195.176:443 avis.mantova.it tcp
US 8.8.8.8:53 fla.se udp
SE 91.201.63.7:443 fla.se tcp
SE 91.201.63.7:443 fla.se tcp
US 8.8.8.8:53 sjtpo.org udp
US 65.60.10.226:443 sjtpo.org tcp
US 65.60.10.226:443 sjtpo.org tcp
US 8.8.8.8:53 kroophold-sjaelland.dk udp
DK 178.20.216.245:443 kroophold-sjaelland.dk tcp
DK 178.20.216.245:443 kroophold-sjaelland.dk tcp
US 8.8.8.8:53 alharsunindo.com udp
SG 45.90.230.13:443 alharsunindo.com tcp
SG 45.90.230.13:443 alharsunindo.com tcp
US 8.8.8.8:53 tothebackofthemoon.com udp
US 162.241.217.186:443 tothebackofthemoon.com tcp
US 162.241.217.186:443 tothebackofthemoon.com tcp
US 8.8.8.8:53 chainofhopeeurope.eu udp
FR 51.15.159.75:443 chainofhopeeurope.eu tcp
FR 51.15.159.75:443 chainofhopeeurope.eu tcp
US 8.8.8.8:53 smartmind.net udp
ES 82.98.154.79:443 smartmind.net tcp
US 8.8.8.8:53 akcadagofis.com udp
TR 5.180.184.153:443 akcadagofis.com tcp
TR 5.180.184.153:443 akcadagofis.com tcp
US 8.8.8.8:53 bundan.com udp
NL 35.214.211.239:443 bundan.com tcp
NL 35.214.211.239:443 bundan.com tcp
US 8.8.8.8:53 graygreenbiomedservices.com udp
US 8.8.8.8:53 dogsunlimitedguide.com udp
US 8.8.8.8:53 rvside.com udp
US 172.67.196.85:443 rvside.com tcp
US 8.8.8.8:53 davedavisphotos.com udp
US 8.8.8.8:53 johnstonmingmanning.com udp
US 162.159.136.54:443 johnstonmingmanning.com tcp
US 162.159.136.54:443 johnstonmingmanning.com tcp
US 8.8.8.8:53 mangimirossana.it udp
DE 80.240.20.142:443 mangimirossana.it tcp
DE 80.240.20.142:443 mangimirossana.it tcp
US 8.8.8.8:53 welovecustomers.fr udp
FR 51.15.236.35:443 welovecustomers.fr tcp
US 8.8.8.8:53 kenmccallum.com udp
US 172.67.196.62:443 kenmccallum.com tcp
US 172.67.196.62:443 kenmccallum.com tcp
US 8.8.8.8:53 glas-kuck.de udp
DE 51.195.6.20:443 glas-kuck.de tcp
DE 51.195.6.20:443 glas-kuck.de tcp
US 8.8.8.8:53 theboardroomafrica.com udp
FR 160.153.133.193:443 theboardroomafrica.com tcp
FR 160.153.133.193:443 theboardroomafrica.com tcp
US 8.8.8.8:53 slideevents.be udp
DE 94.237.96.23:443 slideevents.be tcp
DE 94.237.96.23:443 slideevents.be tcp
US 8.8.8.8:53 omegamarbella.com udp
NL 35.214.249.33:443 omegamarbella.com tcp
NL 35.214.249.33:443 omegamarbella.com tcp
US 8.8.8.8:53 zdrowieszczecin.pl udp
PL 195.78.67.66:443 zdrowieszczecin.pl tcp

Files

memory/1688-0-0x00000000000E0000-0x00000000000EA000-memory.dmp

memory/1688-1-0x00000000000E0000-0x00000000000EA000-memory.dmp

memory/1688-2-0x0000000001F90000-0x0000000002059000-memory.dmp

memory/1688-5-0x0000000000260000-0x000000000027F000-memory.dmp

memory/1688-11-0x0000000000160000-0x0000000000166000-memory.dmp

memory/1688-10-0x0000000000110000-0x0000000000111000-memory.dmp

memory/1688-9-0x0000000000100000-0x0000000000101000-memory.dmp

memory/1688-8-0x00000000000F0000-0x00000000000F1000-memory.dmp

memory/1688-7-0x0000000000160000-0x0000000000166000-memory.dmp

memory/1688-6-0x0000000002590000-0x0000000002699000-memory.dmp

memory/1688-4-0x0000000002280000-0x00000000023AD000-memory.dmp

memory/1688-3-0x00000000021E0000-0x000000000227F000-memory.dmp

memory/1688-12-0x0000000000160000-0x0000000000166000-memory.dmp

memory/1688-14-0x0000000000110000-0x0000000000111000-memory.dmp

C:\Users\lnb2t8g7-readme.txt

MD5 65e7562343457f767ad4ee8710baa55d
SHA1 aa84df7905d3ffc30feb936b344866ec9f695f3d
SHA256 9c17e500ef17ab6a491c997dfd8f60adf2644e3989d633c044bd2a131fd0d0c4
SHA512 9bffe9a3b04e2e5922c8294fd997f123a283caccc099706f37b3a1626198eb96ac5eddda340d27bb20a263252156ebbac9df0ea84760ffb98ac3d3903330a45d

C:\Users\Admin\AppData\Local\Temp\CabE93.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarEA6.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b