Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll
-
Size
116KB
-
MD5
0532e250400ded8515f6d042d388ff07
-
SHA1
e47ed9a5120f928da174a0178b1698aad8baf0b5
-
SHA256
938e0e4868f00c4cda6f6b70542e6eb0d04982b706cd4eb5a4becb7c2da1fd3f
-
SHA512
b03da56c18d7b084ce09fd3dfa1cfeb19c07ee5fc5b0bdbfb0ea935e72c6a4b5e1198aa3362e505d5e178c0df0ff2d8a479f8d96aba13d068343c72b0cc4f27e
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AyBqy8xNoE854+PhIGf:8vnuGqfGOqVByBqy8xN4f
Malware Config
Extracted
C:\Users\1454h-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E084E404BE099F37
http://decryptor.cc/E084E404BE099F37
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\R: rundll32.exe -
Drops file in Program Files directory 33 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\program files\ExitReset.midi rundll32.exe File opened for modification \??\c:\program files\OpenSelect.mp2 rundll32.exe File opened for modification \??\c:\program files\PublishMeasure.mpg rundll32.exe File opened for modification \??\c:\program files\InvokeClose.cfg rundll32.exe File opened for modification \??\c:\program files\RedoStep.xml rundll32.exe File opened for modification \??\c:\program files\RevokeClose.gif rundll32.exe File opened for modification \??\c:\program files\SearchStep.docx rundll32.exe File created \??\c:\program files (x86)\1454h-readme.txt rundll32.exe File opened for modification \??\c:\program files\AssertBackup.mpg rundll32.exe File opened for modification \??\c:\program files\ConvertFromWatch.mov rundll32.exe File opened for modification \??\c:\program files\EnableHide.wps rundll32.exe File opened for modification \??\c:\program files\SelectRepair.docm rundll32.exe File opened for modification \??\c:\program files\CompleteUnpublish.xml rundll32.exe File opened for modification \??\c:\program files\OutUninstall.aifc rundll32.exe File opened for modification \??\c:\program files\RevokePop.dwfx rundll32.exe File opened for modification \??\c:\program files\UnprotectGet.mp3 rundll32.exe File created \??\c:\program files\1454h-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupSend.eps rundll32.exe File opened for modification \??\c:\program files\ExitPing.pcx rundll32.exe File opened for modification \??\c:\program files\PingUnlock.easmx rundll32.exe File opened for modification \??\c:\program files\UnprotectComplete.MTS rundll32.exe File opened for modification \??\c:\program files\RequestDebug.vsw rundll32.exe File opened for modification \??\c:\program files\SwitchRename.3gp rundll32.exe File opened for modification \??\c:\program files\UpdateSet.m4v rundll32.exe File opened for modification \??\c:\program files\WaitOut.bmp rundll32.exe File opened for modification \??\c:\program files\ExportUndo.tif rundll32.exe File opened for modification \??\c:\program files\LockMove.mp4 rundll32.exe File opened for modification \??\c:\program files\NewOpen.ADT rundll32.exe File opened for modification \??\c:\program files\RepairGrant.vsdm rundll32.exe File opened for modification \??\c:\program files\ImportConvertFrom.ADTS rundll32.exe File opened for modification \??\c:\program files\ConvertLock.jpe rundll32.exe File opened for modification \??\c:\program files\GrantUnlock.eps rundll32.exe File opened for modification \??\c:\program files\WatchInvoke.mov rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4948 rundll32.exe 4948 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
rundll32.exevssvc.exedescription pid process Token: SeDebugPrivilege 4948 rundll32.exe Token: SeTakeOwnershipPrivilege 4948 rundll32.exe Token: SeBackupPrivilege 2248 vssvc.exe Token: SeRestorePrivilege 2248 vssvc.exe Token: SeAuditPrivilege 2248 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3096 wrote to memory of 4948 3096 rundll32.exe rundll32.exe PID 3096 wrote to memory of 4948 3096 rundll32.exe rundll32.exe PID 3096 wrote to memory of 4948 3096 rundll32.exe rundll32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0532e250400ded8515f6d042d388ff07_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3476
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD519c917c087c0746d15a88e4f32598475
SHA12e0e8354c801d8b3189394cc58e64e6e33316052
SHA256c3a2f7c73c87a8a23317cd0922f5eda7ebdbeb66a6ccd29ca909e831f99d3b9c
SHA512fada61cafcb275f6d9412ae91d50874e15d3419b8c4a6faf514d63d97f6c19869ba93025227ae3445ecae2eed5c61aa35ff274a098085134669af4a5e15a30d6