Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 12:32

General

  • Target

    0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    0532e250400ded8515f6d042d388ff07

  • SHA1

    e47ed9a5120f928da174a0178b1698aad8baf0b5

  • SHA256

    938e0e4868f00c4cda6f6b70542e6eb0d04982b706cd4eb5a4becb7c2da1fd3f

  • SHA512

    b03da56c18d7b084ce09fd3dfa1cfeb19c07ee5fc5b0bdbfb0ea935e72c6a4b5e1198aa3362e505d5e178c0df0ff2d8a479f8d96aba13d068343c72b0cc4f27e

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AyBqy8xNoE854+PhIGf:8vnuGqfGOqVByBqy8xN4f

Score
10/10

Malware Config

Extracted

Path

C:\Users\25990343-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 25990343. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F5BA51E6C2DE1C27 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F5BA51E6C2DE1C27 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: GZ75qS8A3P1/z8dbl1A4oOJ089+KnQCSzu7jz1J0Vvqj2NQ32SbOwclR1zaYNhkQ 3PZVimMQH2bC5vhgat2lx6ICCUwjcUw96AF+QJiTZIQL8XawzQWKS7856zuQ/dSS ullKEwrAn771e5r2ZPkrW3LqT+EUZA7kQUObshQmPavK8vck/rNBKwvpYjkGiYue 3Bkm/gtN4TLyTikTaXg3PcrbkPSXKvvm/YcM6NA/L6Xj0KJDDmKC8uysOXfaNidC 9It4pRjzAYS1Y5owKxkdtgKGYlOohAdeTR1Y3/WIyZ3KvtS5UktN+Py/VSMDyWqt Dwe4zybfRiNEIVr19lgqRvstGGCgYNgYBsvmTokqKouB0UrPUbnJOFUaQMff/F6d yMXFHkAYVGi/lugAoxSxHIkq1w+N8uE1WejTmtxGMYwyTmXg2gFJ1xCKIVTHTbm6 DihW1LGUyMHGH21BVb+pnAIeGCLywHkGhN+epHtWpKkniUNK4QTvMbRUkvzk9O8S /XqVhVdhI1Ea8kA1AY+83YmlGv8l+qFYHthOKCXNBOGXA+P0nJ7I32+VqYxK8GRu jQLOnZrllvVELleXxaW5hsLRw4y6l068ZJXCK4yhjVquqoYrTgHH6/hoOmqM8upj lAOV213NAuLvAtmW0xloUldl3oPxmk4oSkKFRfRTmDvvvxLvq39xdIVGLtCVC3mF 8fnTBVEZMOdc23xVy3/LAg3dYDoDNZbjFQTMPExWBL5JPGtvyOWSNx48ZCxzrFWi tBFUjKOBhp7M0rOh7Ne3QY9dO1hZ+4+T6qMFwgCjXQ9agwzIpLmnER0jUgpPAtoM 09U2oA1s4IeFXPN32VZ4oL73YK0lvEU26AU3fVt1mSJ0eUMMYxmbaQGGgP8Hs/Ts hW7PxERt6sHuUOsyo1Y9NFiA5+63x5KoR2J2MojkWH/fYFA1y+Giy+1C5JCHEc1h MbaL0ECjcVrfICTvXZz264XmySI09OmrJX3w8zCV+QRoB+ZsrEZtMuf+rEt4hkQs wcI1jnLkfbuo3RuSAaDqhHmCcZAazRRm+SoyhRiElRz0rVrq77y4tvqRZUPHOyky hrf+dhFYqnA8v9C+fwa4EZ3FKU0GBYOa3LjHR3GWvyx96iWyJHiS5L8Y5Rex29gM 3cqN1rLH8Z4ZT9ZR0cHJp/EeZ1iZsAzq4XGC1YQjt+bP1rfyA8YcaogihXIG+no/ htTnWd8La8aF9dPezOwNtpTky1xiORFg77y/vSm3mMmjEI7chGKRGYClPCxFkjbl B+feYJ7CFxCUT4P30T0WMv6a8kzcJuFHhikKzGCI3fWW6NBmupG3hc35E0Ogi1Ha U9YB4CQJJQsof+d08kHgF3mr5DTtmfLzJwJ3TuH+RiC1inEp ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F5BA51E6C2DE1C27

http://decryptor.cc/F5BA51E6C2DE1C27

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1108
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2340
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\25990343-readme.txt

      Filesize

      6KB

      MD5

      752f6dc418a12619d44df50ea40ecaa3

      SHA1

      1a14f39ce0439f151cd53f7c2d48afb083b6f829

      SHA256

      c78b8b81f28ee03d39dc7102dd432fec3bf4dca0512feb384724cb95d2e71c5d

      SHA512

      7eadc9459b94e096b0ef9d5c70fd82bbbee2287e72612e3f030e60ea0fe732e605238f7bd718effdb19accc332236a2cc76b332f8eb93da0717dab6b8024ab14