Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:36
Behavioral task
behavioral1
Sample
745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe
Resource
win10v2004-20241007-en
General
-
Target
745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe
-
Size
1.9MB
-
MD5
6f0f0f10532bcc6abaf04afd99811e4b
-
SHA1
97f2891294853ccf9693d487f4fe11eea0dcb9d7
-
SHA256
745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f
-
SHA512
41a80f301a47e39c5eda4e444418143a8b320c1876970c2d9054c4d2c6f584e944f2a6bf1fd61c9c2a028a746eaa7b85c907a91aabb3a726e3693d96f90e90c2
-
SSDEEP
49152:DIUWGS3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S3S:bWGS3S3S3S3S3S3S3S3S3S3S3S3S3S3m
Malware Config
Extracted
C:\Users\Default\8yo0ez39o6-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BCB155FB051425BE
http://decryptor.top/BCB155FB051425BE
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Renames multiple (150) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\D: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\F: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\J: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\P: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\R: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\S: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\T: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\K: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\V: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\O: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\Q: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\U: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\G: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\H: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\I: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\L: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\M: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\X: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\Y: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\A: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\B: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\E: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\N: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened (read-only) \??\Z: 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\63x2884p5.bmp" 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rpc-local_31bf3856ad364e35_10.0.19041.1288_none_28c245a0fa440b78_rpcrt4.dll_5aa847dd 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1_de-de_70c254192b5ba65d_dsreg.dll.mui_5d9efc7e 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_de-de_e1c7c5c5782839e2_ncprov.dll.mui_40240de1 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-shcore_31bf3856ad364e35_10.0.19041.1266_none_458e5adc0ac7b84a_shcore.dll_c9cc19cc 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-ucrt_31bf3856ad364e35_10.0.19041.789_none_93e6eb93accdac11.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase_31bf3856ad364e35_10.0.19041.746_none_ebd9b2add93e89de_rasctrnm.h_17610c72 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.19041.1165_none_1ea3d2b20faf7de3_lpk.dll_ebdc1de9 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_10.0.19041.153_none_204dfb4c6c5656d4.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_hu-hu_92e52d62550995c1_comctl32.dll.mui_0da4e682 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-usermodensi_31bf3856ad364e35_10.0.19041.610_none_5075d9ce26303c63_nsi.dll_e72df756 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1202_en-us_e2d6f3ca6473453d_userdeviceregistration.ngc.dll.mui_d2c6ca95 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_pl-pl_1256afb9f5d1a29a_comctl32.dll.mui_0da4e682 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_23fd2654379d802f_gpsvc.dll.mui_0c160ac2 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft.windows.winhttp_31bf3856ad364e35_5.1.19041.264_none_7f6ca9c048dc8aa4.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.964_lt-lt_15f508d8d9b8a291.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..r-library.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_b8b9693c8ab3775e.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_app936.fon_ea7f5612 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-keyiso.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62fee1a8066741a1.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_fr-ca_c03f9b83b540a678_msimsg.dll.mui_72e8994f 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase-core_31bf3856ad364e35_10.0.19041.546_none_0fdfc09722e8c30a_ndistapi.sys_8cfad169 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-security-ngc-kspsvc_31bf3856ad364e35_10.0.19041.84_none_5f9dd4d3686528a6.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-directmanipulation_31bf3856ad364e35_10.0.19041.1202_none_cc30ef1d8b2537d2.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-gdi_31bf3856ad364e35_10.0.19041.1165_none_1ea3d2b20faf7de3.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wbiosrvc.resources_31bf3856ad364e35_10.0.19041.1_de-de_f88fd8d1e0995d78_wbiosrvc.dll.mui_d5b8b2b8 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_10.0.19041.1_it-it_8f7ee59fb65a0495.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-a..on-authui-component_31bf3856ad364e35_10.0.19041.906_none_c5508380a2e74b53_authui.dll_05ff9fd2 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-windowsuiimmersive_31bf3856ad364e35_10.0.19041.264_none_1a061e55674b5901.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_10.0.19041.1_en-us_68a68fbe4b19e7fb_iscsiexe.dll.mui_7d81b1cc 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-keyiso.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ef4c56fbd0b438fa.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_a6382fa8181d9ef8_mpsdrv.sys.mui_b2aea3b6 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_ko-kr_4b8e60a7bca7d650.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_19a87c02033cbe34_gpsvc.dll.mui_0c160ac2 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-truetype-ebrima_31bf3856ad364e35_10.0.19041.1_none_846cdc31fb668b8c_ebrima.ttf_8897b9ba 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lua-onecore.resources_31bf3856ad364e35_10.0.19041.1_de-de_848402175f135dad_appinfo.dll.mui_cfd93456 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.19041.1_de-de_88414bd06cbad686_iprtrmgr.dll.mui_eb023b92 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_lv-lv_ab9bc1d129a747ed_bootmgfw.efi.mui_a6e78cfa 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_10.0.19041.1_de-de_bfb5b9c55c3bdc36_iscsidsc.dll.mui_6acb64a6 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.19041.1_it-it_a0b367f31f29d0aa.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-win32kbase.resources_31bf3856ad364e35_10.0.19041.1_en-us_d6afa8b21943e171.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1023_sr-..-rs_646331312131f0de.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-branding-engine_31bf3856ad364e35_10.0.19041.1202_none_5e2a05871a9a6485.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-com-base.resources_31bf3856ad364e35_10.0.19041.1202_en-us_2d3fe908f2def5d1_combase.dll.mui_6db10b33 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase-raspppoe_31bf3856ad364e35_10.0.19041.1_none_0c2491a439f55f8f_raspppoe.sys_5bc9d88d 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_2d3b6ea159ff4dae_wmiapres.dll.mui_c1b8803f 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..istration.resources_31bf3856ad364e35_10.0.19041.1_en-us_9f803ef667071665_deviceregistration.dll.mui_5b79527a 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.19041.546_none_edd345b6c42269da_rasacd.sys_43640ee7 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-security-spp_31bf3856ad364e35_10.0.19041.1_none_daa70f4df4b13b5c.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..ndactivitymoderator_31bf3856ad364e35_10.0.19041.1_none_8b4593ccb753f4e5.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-msauditevtlog_31bf3856ad364e35_10.0.19041.610_none_a556313cd729d07d_msobjs.dll_052c8a60 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase-core_31bf3856ad364e35_10.0.19041.546_none_0fdfc09722e8c30a.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ui-xaml-maps_31bf3856ad364e35_10.0.19041.264_none_752f4df028ff40af.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_it-it_4518c9a6348a0867.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.19041.1_it-it_a83e66a954bae1fd.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.19041.906_lt-lt_9b4bcf435f4dca5e_msimsg.dll.mui_72e8994f 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lsa.resources_31bf3856ad364e35_10.0.19041.1_es-es_3c643eb9361fcf47.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smbminirdr_31bf3856ad364e35_10.0.19041.153_none_5d7cdbd3aff794ea.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmpdui.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d2104853b0241561.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1023_fr-ca_2a30712948bc8e20_comctl32.dll.mui_0da4e682 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_sr-..-rs_58dfd3602ef5b7be.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_dce99e60f3445847_apphelp.dll.mui_59096153 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..istration.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ce50872d244d15c5.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-appid.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_98f313bc73921546.manifest 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_b988e3f5244c4507_mofcomp.exe.mui_35badf56 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.19041.1_none_ca60666860ba12d7_ega40850.fon_5e8f5479 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe 2896 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2708 2896 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe 83 PID 2896 wrote to memory of 2708 2896 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe 83 PID 2896 wrote to memory of 2708 2896 745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe"C:\Users\Admin\AppData\Local\Temp\745da563270a1280bf3672f59bfc61bec18f2e87f9a3c86b15bab756a297125f.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d9a8212c8ebb32a2ab9526b6fa466017
SHA147fcb26ef47dce784f41519e7f12313aefb7f793
SHA256d2eebd4844fa85e0cc8887b9029b2eb21a7353ec21f2ea50eba4afa8796b8a50
SHA5121d17ee5b8419c1997bf20526e992cec6c40166919653a06eb6bcda14f1362ca5e4688efd7a2250a07f55dcbb57a7f0a425fd63fcc14dfc39b24911272123029c