Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e_dump7_0x00730000.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e_dump7_0x00730000.dll
Resource
win10v2004-20241007-en
General
-
Target
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.dll
-
Size
166KB
-
MD5
a2fe81e5b83c0d1ea321429446870e18
-
SHA1
b1fc2a1e8e1739ecf9fe2e0b7b20618321eea765
-
SHA256
e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e
-
SHA512
b0a250932cebbcfed89564a67c6b5385b9a65e089810bd071b1be721af7fee55af8ec31fd7b415295b6bbd1b2f1ef564c4a8c3c7b40101d1e90e5fb0cd7905c9
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfxCy1Z4HYPzy:Ww9vteqJggn7oUf0yyHL
Malware Config
Extracted
C:\Recovery\g42p0b-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/DB98A9D93549B9FE
http://decryptor.cc/DB98A9D93549B9FE
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File created \??\c:\program files\g42p0b-readme.txt rundll32.exe File opened for modification \??\c:\program files\MountMeasure.contact rundll32.exe File opened for modification \??\c:\program files\ResetInitialize.mpe rundll32.exe File opened for modification \??\c:\program files\ResetReceive.aiff rundll32.exe File opened for modification \??\c:\program files\TraceShow.html rundll32.exe File opened for modification \??\c:\program files\UnpublishInitialize.m1v rundll32.exe File opened for modification \??\c:\program files\WatchSearch.otf rundll32.exe File opened for modification \??\c:\program files\ConvertFromLock.cfg rundll32.exe File opened for modification \??\c:\program files\UnprotectUnlock.php rundll32.exe File opened for modification \??\c:\program files\CheckpointMeasure.aif rundll32.exe File opened for modification \??\c:\program files\CompareInvoke.wm rundll32.exe File opened for modification \??\c:\program files\SendDismount.mpeg rundll32.exe File opened for modification \??\c:\program files\UndoSuspend.xlt rundll32.exe File opened for modification \??\c:\program files\CheckpointFormat.ppsx rundll32.exe File opened for modification \??\c:\program files\RemoveApprove.ppt rundll32.exe File opened for modification \??\c:\program files\ShowImport.tif rundll32.exe File opened for modification \??\c:\program files\SwitchCompare.vsw rundll32.exe File opened for modification \??\c:\program files\SwitchExit.jpeg rundll32.exe File opened for modification \??\c:\program files\GetResolve.svgz rundll32.exe File opened for modification \??\c:\program files\HidePush.iso rundll32.exe File opened for modification \??\c:\program files\ReadUnregister.ram rundll32.exe File opened for modification \??\c:\program files\UndoNew.wma rundll32.exe File created \??\c:\program files (x86)\g42p0b-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupShow.tiff rundll32.exe File opened for modification \??\c:\program files\InstallNew.svg rundll32.exe File opened for modification \??\c:\program files\RenameUninstall.emf rundll32.exe File opened for modification \??\c:\program files\UnblockResolve.mht rundll32.exe File opened for modification \??\c:\program files\UnlockStart.wmx rundll32.exe File opened for modification \??\c:\program files\FindClose.emf rundll32.exe File opened for modification \??\c:\program files\ProtectSplit.7z rundll32.exe File opened for modification \??\c:\program files\RestartInstall.mht rundll32.exe File opened for modification \??\c:\program files\SuspendClear.potm rundll32.exe File opened for modification \??\c:\program files\UnpublishExit.ADT rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 740 rundll32.exe 740 rundll32.exe 2716 powershell.exe 2716 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 740 rundll32.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeBackupPrivilege 4484 vssvc.exe Token: SeRestorePrivilege 4484 vssvc.exe Token: SeAuditPrivilege 4484 vssvc.exe Token: SeTakeOwnershipPrivilege 740 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2872 wrote to memory of 740 2872 rundll32.exe 83 PID 2872 wrote to memory of 740 2872 rundll32.exe 83 PID 2872 wrote to memory of 740 2872 rundll32.exe 83 PID 740 wrote to memory of 2716 740 rundll32.exe 85 PID 740 wrote to memory of 2716 740 rundll32.exe 85 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e80810241a2c6991cd3cfc807a62c1392eeed146fc60cb30326a8e3bc6bc284e.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3924
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b7b64a0272efba899ac25214207fb4ba
SHA1347781424b2b597eef33fe22c27f40884459c9a1
SHA256ddbcf926e3f9600e328286043cd472e4c9e7017e601465bb7325902f269f11ba
SHA512a036bc2b9061a3ed8251d20f86b7d7f2531ce1736e0eb11a6c9524ec1de0fa0c665b2b96d6891274ae09c6e7b5df4a1f27fd587e60a7fa21b7c7f247c6261bba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82