Resubmissions
31-01-2025 15:30
250131-sxp85azjcz 1014-01-2025 05:35
250114-gaenbszqam 1010-01-2025 23:50
250110-3vv2pswmhj 1011-12-2024 15:19
241211-sqgcmssnbr 1009-12-2024 01:54
241209-cbqprsxngx 1026-11-2024 23:15
241126-28wpqa1ndp 1030-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 10Analysis
-
max time kernel
65s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 15:30
Static task
static1
Behavioral task
behavioral1
Sample
v2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
v2.exe
Resource
win10v2004-20241007-en
General
-
Target
v2.exe
-
Size
121KB
-
MD5
944ed18066724dc6ca3fb3d72e4b9bdf
-
SHA1
1a19c8793cd783a5bb89777f5bc09e580f97ce29
-
SHA256
74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f
-
SHA512
a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3
-
SSDEEP
1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY
Malware Config
Extracted
C:\Recovery\j01d0g93v2-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BC1326926F493EAB
http://decoder.re/BC1326926F493EAB
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\j01d0g93v2-readme.txt v2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: v2.exe File opened (read-only) \??\E: v2.exe File opened (read-only) \??\G: v2.exe File opened (read-only) \??\I: v2.exe File opened (read-only) \??\J: v2.exe File opened (read-only) \??\O: v2.exe File opened (read-only) \??\P: v2.exe File opened (read-only) \??\L: v2.exe File opened (read-only) \??\M: v2.exe File opened (read-only) \??\S: v2.exe File opened (read-only) \??\T: v2.exe File opened (read-only) \??\A: v2.exe File opened (read-only) \??\W: v2.exe File opened (read-only) \??\X: v2.exe File opened (read-only) \??\Z: v2.exe File opened (read-only) \??\H: v2.exe File opened (read-only) \??\K: v2.exe File opened (read-only) \??\N: v2.exe File opened (read-only) \??\Q: v2.exe File opened (read-only) \??\R: v2.exe File opened (read-only) \??\U: v2.exe File opened (read-only) \??\V: v2.exe File opened (read-only) \??\Y: v2.exe File opened (read-only) \??\F: v2.exe File opened (read-only) \??\D: v2.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification \??\c:\program files\ReceiveHide.wvx v2.exe File opened for modification \??\c:\program files\RestartAssert.mht v2.exe File opened for modification \??\c:\program files\TestWrite.emz v2.exe File opened for modification \??\c:\program files\UpdateCompress.xltx v2.exe File opened for modification \??\c:\program files\MeasureDeny.pot v2.exe File opened for modification \??\c:\program files\PublishRegister.doc v2.exe File opened for modification \??\c:\program files\UpdateUndo.aifc v2.exe File opened for modification \??\c:\program files\StartClear.temp v2.exe File opened for modification \??\c:\program files\ConnectMeasure.wma v2.exe File opened for modification \??\c:\program files\InitializeApprove.svgz v2.exe File opened for modification \??\c:\program files\ResumeSend.php v2.exe File opened for modification \??\c:\program files\SplitEdit.mp4v v2.exe File opened for modification \??\c:\program files\ConfirmSplit.png v2.exe File opened for modification \??\c:\program files\DismountTest.aifc v2.exe File opened for modification \??\c:\program files\HideSave.nfo v2.exe File opened for modification \??\c:\program files\SyncDisconnect.mpeg2 v2.exe File opened for modification \??\c:\program files\UnregisterSuspend.otf v2.exe File opened for modification \??\c:\program files\WaitLock.easmx v2.exe File created \??\c:\program files\j01d0g93v2-readme.txt v2.exe File created \??\c:\program files (x86)\j01d0g93v2-readme.txt v2.exe File opened for modification \??\c:\program files\EnableBackup.cfg v2.exe File opened for modification \??\c:\program files\OptimizeMeasure.wax v2.exe File opened for modification \??\c:\program files\ResumeSync.potm v2.exe File opened for modification \??\c:\program files\JoinUninstall.pptm v2.exe File opened for modification \??\c:\program files\MergeProtect.DVR-MS v2.exe File opened for modification \??\c:\program files\RepairUnlock.midi v2.exe File opened for modification \??\c:\program files\ResolveAdd.wm v2.exe File opened for modification \??\c:\program files\CompareRestore.mpg v2.exe File opened for modification \??\c:\program files\CompressNew.wps v2.exe File opened for modification \??\c:\program files\ResetOptimize.ADT v2.exe File opened for modification \??\c:\program files\SwitchOut.jpeg v2.exe File opened for modification \??\c:\program files\BackupExport.xlsm v2.exe File opened for modification \??\c:\program files\StartDisable.xla v2.exe File opened for modification \??\c:\program files\UnblockRemove.rtf v2.exe File opened for modification \??\c:\program files\UseNew.temp v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3972 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2524 v2.exe 2524 v2.exe 2524 v2.exe 2524 v2.exe 2524 v2.exe 2524 v2.exe 2524 v2.exe 2524 v2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2524 v2.exe Token: SeTakeOwnershipPrivilege 2524 v2.exe Token: SeBackupPrivilege 1148 vssvc.exe Token: SeRestorePrivilege 1148 vssvc.exe Token: SeAuditPrivilege 1148 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5916 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5148 wrote to memory of 3972 5148 OpenWith.exe 107 PID 5148 wrote to memory of 3972 5148 OpenWith.exe 107 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3652
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\j01d0g93v2-readme.txt1⤵PID:5136
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\j01d0g93v2-readme.txt1⤵PID:5240
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\j01d0g93v2-readme.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:5916
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\j01d0g93v2-readme.txt1⤵PID:5952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SubmitRequest.xlsx.j01d0g93v22⤵
- Opens file in notepad (likely ransom note)
PID:3972
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5873370cd3f55309fb37ccba8c844a0ba
SHA1cb32e3761e5d2ff8aadae03a68a01848ec894359
SHA256ceb35a32a48e47797e40a0955b326fc875cc7fd64767ba0918feae5d411a93f8
SHA5121e02c09ed9b19fd042555a166a3981ccd2916a99728fbe0ee52aeaec40fb46577c52731cc7410be85c3e40c7e2993bad9834018b090365aa474beb6e17af8177
-
Filesize
10KB
MD5df3733b93cae053384b3fca542ddb837
SHA176a98a5f4e37be8e77d6237854bf9bccafc95ab2
SHA2565389aab9a03188903834772f3adde32b12e855cdc586f17fe3290258ab780cd8
SHA512fe66260739fbf1d5f54fef11421b753c5c43e89ecaa769ff20c3a67a551d5632271ea03a9ee5238773eaae5978ec921a675fc23a090e1e861bf281431db06031