File name:

Sodinokibi.zip

Full analysis: https://app.any.run/tasks/519f6658-c217-4079-946a-a8fd6053a9d6
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: June 08, 2025, 14:05:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
sodinokibi
revil
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

BBEB3722225A8520617278633025521C

SHA1:

C58F77B0B2090D22F3DE4BCCFF3F1DA44BCB597A

SHA256:

136E04EF4685DDEF7B3CFED84DEDCF0CE1D0BD27C6D29C2142CF8F28DDD16682

SSDEEP:

1536:g1OkveXGS8oDnLDobNCAi14nEaFnVRHokHtHkX/s:zGS8ozLDUol14nE+3IkNHkPs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7796)
    • RANSOMWARE has been detected

      • Sodinokibi.exe (PID: 7356)
    • Sodinokibi ransom note is found

      • Sodinokibi.exe (PID: 7356)
    • SODINOKIBI has been detected (YARA)

      • Sodinokibi.exe (PID: 7356)
    • Renames files like ransomware

      • Sodinokibi.exe (PID: 7356)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Sodinokibi.exe (PID: 6840)
    • Application launched itself

      • Sodinokibi.exe (PID: 6840)
    • Creates file in the systems drive root

      • Sodinokibi.exe (PID: 7356)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7568)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7796)
    • Manual execution by a user

      • Sodinokibi.exe (PID: 6840)
      • notepad.exe (PID: 7276)
    • Checks supported languages

      • Sodinokibi.exe (PID: 6840)
      • Sodinokibi.exe (PID: 7356)
    • Process checks computer location settings

      • Sodinokibi.exe (PID: 6840)
    • Reads the computer name

      • Sodinokibi.exe (PID: 7356)
      • Sodinokibi.exe (PID: 6840)
    • Reads the software policy settings

      • slui.exe (PID: 5552)
    • Create files in a temporary directory

      • Sodinokibi.exe (PID: 7356)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7276)
    • Checks proxy server information

      • slui.exe (PID: 1088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:12:14 08:11:38
ZipCRC: 0x5bc2a9dc
ZipCompressedSize: 73971
ZipUncompressedSize: 120832
ZipFileName: Sodinokibi.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe sodinokibi.exe no specs THREAT sodinokibi.exe unsecapp.exe no specs vssvc.exe no specs slui.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5096C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5552"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6840"C:\Users\admin\Desktop\Sodinokibi.exe" C:\Users\admin\Desktop\Sodinokibi.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\sodinokibi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
7276"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\qdo97-readme.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7348C:\WINDOWS\system32\wbem\unsecapp.exe -EmbeddingC:\Windows\System32\wbem\unsecapp.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Sink to receive asynchronous callbacks for WMI client application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
7356"C:\Users\admin\Desktop\Sodinokibi.exe" C:\Users\admin\Desktop\Sodinokibi.exe
Sodinokibi.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\sodinokibi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
7568C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7796"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Sodinokibi.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
5 013
Read events
4 981
Write events
32
Delete events
0

Modification events

(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Sodinokibi.zip
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7796) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
1
Suspicious files
134
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
7356Sodinokibi.exeC:\Users\admin\Desktop\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\MicrosoftEdgeBackups\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\Music\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\Public\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\Pictures\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\Searches\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\bootTel.dat.qdo97binary
MD5:D81243437AAAE70A4C033679AD8B6C8E
SHA256:5103DB402E8947964779FA82BF1CBF11865973C7F7BFDD6D247CC2F9E1CB3DD5
7356Sodinokibi.exeC:\Users\admin\.ms-ad\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
7356Sodinokibi.exeC:\Users\admin\3D Objects\qdo97-readme.txtbinary
MD5:9E3EAFA6CB9DE0551786E236B3A49D31
SHA256:4E4136BDDA75960365A548AECFD88CE966E5B5025DC14E74A6268D4B111746C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1852
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1852
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5868
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5408
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5408
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.130
  • 20.190.160.14
  • 40.126.32.76
  • 20.190.160.4
  • 40.126.32.72
  • 20.190.160.131
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info