Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 13:23

General

  • Target

    2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe

  • Size

    382KB

  • MD5

    4d5d9411e1b8ca44b771f13e2de2219b

  • SHA1

    903d2cd37ede4563ed81d256e9ee6068ec70a63a

  • SHA256

    fcc12388b7ae16efd8157df3fe8fd56ffaf913845ff1d603af7f1ef3b2e09627

  • SHA512

    725f64b0d2b8e4284a3422ff3a66aef1084cdfa4572ec79ec3cb300fc8f51113fda57bd8425ea699bea8fe01b88b7bf4801f04550050eae0502a18ce553c1bf7

  • SSDEEP

    6144:Txabm6ij2JyQHHwIJOFYhs+gZ8XybnWJ/gIF+lmLrvGW4:NWJyQHHwIJOqhILkYIOovGW4

Malware Config

Signatures

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi/Revil sample 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe"
      2⤵
      • Executes dropped EXE
      PID:1936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 224
        3⤵
        • Program crash
        PID:1384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1092
      2⤵
      • Program crash
      PID:4712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1936 -ip 1936
    1⤵
      PID:1016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2264 -ip 2264
      1⤵
        PID:5108

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Event Triggered Execution

      1
      T1546

      Change Default File Association

      1
      T1546.001

      Privilege Escalation

      Event Triggered Execution

      1
      T1546

      Change Default File Association

      1
      T1546.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
        Filesize

        86KB

        MD5

        a52b5790c7d8170f21ad6c1377fd46d4

        SHA1

        13baa64c26495b950a0d75f48dd69f48994f65df

        SHA256

        f044f31fd69157dc978bfbeb02a4fce467993911e90df9d1f692be7a903cab3e

        SHA512

        13040f92f3419ea8afd7c64464fe680dc8980593b7bc2e8afabc636aae83b1bd18a852d2e2e6d7e82eca49e8e5aa56936d5d657b0c0c0e4f62329c32a99fc773

      • C:\Users\Admin\AppData\Local\Temp\3582-490\2024-06-11_4d5d9411e1b8ca44b771f13e2de2219b_revil_sodinokibi.exe
        Filesize

        341KB

        MD5

        992cd1673799f097e9243a53a31042cf

        SHA1

        726ee50b054d3027f28e8c2b0621f44c1a91b045

        SHA256

        6b1dd384ada65b6239eb0a22f00343eb6939e379e5ab07fe95b80fcc524db73d

        SHA512

        d27358619850bc0e4726c3fd05914cedd34f6698d5b34edf7e6a55dd6b5052454020e456d31a2963e8f064a9f799be6ca770e37606e94fa67cc6f4083591fa79

      • memory/2264-5-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/2264-4-0x0000000004EE0000-0x0000000004EEC000-memory.dmp
        Filesize

        48KB

      • memory/2264-3-0x0000000004FD0000-0x00000000050D0000-memory.dmp
        Filesize

        1024KB

      • memory/2264-105-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB