Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
-
Size
116KB
-
MD5
0532e250400ded8515f6d042d388ff07
-
SHA1
e47ed9a5120f928da174a0178b1698aad8baf0b5
-
SHA256
938e0e4868f00c4cda6f6b70542e6eb0d04982b706cd4eb5a4becb7c2da1fd3f
-
SHA512
b03da56c18d7b084ce09fd3dfa1cfeb19c07ee5fc5b0bdbfb0ea935e72c6a4b5e1198aa3362e505d5e178c0df0ff2d8a479f8d96aba13d068343c72b0cc4f27e
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AyBqy8xNoE854+PhIGf:8vnuGqfGOqVByBqy8xN4f
Malware Config
Extracted
C:\Users\25990343-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F5BA51E6C2DE1C27
http://decryptor.cc/F5BA51E6C2DE1C27
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe -
Drops file in Program Files directory 29 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\program files\RestartEdit.odp rundll32.exe File opened for modification \??\c:\program files\SwitchUnlock.vstx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\25990343-readme.txt rundll32.exe File opened for modification \??\c:\program files\BlockUninstall.zip rundll32.exe File opened for modification \??\c:\program files\ConnectAssert.jpeg rundll32.exe File opened for modification \??\c:\program files\ConvertToBackup.emf rundll32.exe File opened for modification \??\c:\program files\OpenFormat.php rundll32.exe File opened for modification \??\c:\program files\UnregisterExport.vsdm rundll32.exe File created \??\c:\program files\25990343-readme.txt rundll32.exe File opened for modification \??\c:\program files\AssertDisable.nfo rundll32.exe File opened for modification \??\c:\program files\InvokeLock.dib rundll32.exe File opened for modification \??\c:\program files\OpenInvoke.dib rundll32.exe File opened for modification \??\c:\program files\UseStart.jpeg rundll32.exe File created \??\c:\program files (x86)\25990343-readme.txt rundll32.exe File opened for modification \??\c:\program files\SetNew.ini rundll32.exe File opened for modification \??\c:\program files\RequestConvertTo.001 rundll32.exe File opened for modification \??\c:\program files\ResolveConnect.3gp rundll32.exe File opened for modification \??\c:\program files\ResolveUnprotect.M2TS rundll32.exe File opened for modification \??\c:\program files\GroupUnregister.vdx rundll32.exe File opened for modification \??\c:\program files\RedoConvertTo.dwfx rundll32.exe File opened for modification \??\c:\program files\StartRevoke.mid rundll32.exe File opened for modification \??\c:\program files\InitializeEnter.clr rundll32.exe File opened for modification \??\c:\program files\ReadSubmit.mpg rundll32.exe File opened for modification \??\c:\program files\UndoConfirm.kix rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\25990343-readme.txt rundll32.exe File opened for modification \??\c:\program files\EnterNew.mpeg rundll32.exe File opened for modification \??\c:\program files\RequestComplete.wm rundll32.exe File opened for modification \??\c:\program files\ConvertFromConvertTo.vdw rundll32.exe File opened for modification \??\c:\program files\OpenMeasure.png rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1108 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exevssvc.exedescription pid process Token: SeDebugPrivilege 1108 rundll32.exe Token: SeTakeOwnershipPrivilege 1108 rundll32.exe Token: SeBackupPrivilege 2812 vssvc.exe Token: SeRestorePrivilege 2812 vssvc.exe Token: SeAuditPrivilege 2812 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe PID 2912 wrote to memory of 1108 2912 rundll32.exe rundll32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2340
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5752f6dc418a12619d44df50ea40ecaa3
SHA11a14f39ce0439f151cd53f7c2d48afb083b6f829
SHA256c78b8b81f28ee03d39dc7102dd432fec3bf4dca0512feb384724cb95d2e71c5d
SHA5127eadc9459b94e096b0ef9d5c70fd82bbbee2287e72612e3f030e60ea0fe732e605238f7bd718effdb19accc332236a2cc76b332f8eb93da0717dab6b8024ab14