Resubmissions

01-05-2024 16:41

240501-t6493sdf43 10

01-05-2024 12:24

240501-pk4dfagh25 10

Analysis

  • max time kernel
    118s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 12:24

General

  • Target

    0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    0bcaab2d6aae4221ae17527874cd1167

  • SHA1

    682cef7ee433feb06c1db1d445f9618eeff5eb95

  • SHA256

    dd7c40b211a54f1c860c85af0f488cf3aab9608041294f281261b636b59e494d

  • SHA512

    72a089cf1294ef7fc6d2f0b3e706e46b99be97bbb9f018f45f5c954673006f3f8bda683f7b62f0de91202f5873ff0abe23befc8e2558ef3283c6d13e74a9e08e

  • SSDEEP

    3072:70XoUeZ/DVS8L7flcMTeYWikGLvFfdL+qaXgOvGwZxC4:7eoUeZRlcYxWYTFflnaPvGe

Malware Config

Extracted

Path

C:\Recovery\2z6re5-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 2z6re5. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6B1393877B10E858 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/6B1393877B10E858 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 4w+34mCpg2zYtcBeDLEzmD1++k9fcQt+cARwPeVz8UyKlbequa8tn12R0ZPFUnwP J68+f/2rXxv4w/5r/4/f5QFQtWN5txPQGruBBwWEJx2RMk0/pmfyhS15V1muNDUm e+tREcUajtwU9HQDwJAFitX/0KthURlW7kS0L6L5TTMQTrUjVWImCAxXTYtfePyW Lp3Is48ENyhoVSo+BLmM/vnbTZpx85kW2kfXCOEWXgikCdFZvRgC6WO2xaTJ0+in 1rVQAzbVQxRUzVQrlpP+aOVfy8qndzXGiZFKeV5weADqYQfFPY5XW6NUQBN4FlIR g44wY8mj1+LN7XzbPJQRWPoLV1exnP//JLPippO6BaolU68ver/qVntt7JrWvY/B XYigHF7RFjljsPg5fRYCChHYBBRpjU8Yh9mbaZmfj6SFsM3+5kQ6tDdpCwTjNc7Q QnfzxUZ9w9JNPc0l98kAk0XzL9qKsfhYWVVMyjx3LWi3am/LCUeHUn1pFag2h9Ld OCFkbD4k5LYuvfUkX6WFc4id/Pst9v1YDaF+BjwOpBN4Vmd8wov6oxxn7pVn1BVH 1q1L2pwlF6qlbvCaMhgKa9AXGWaDyued5vSrApgtEuIq+LeeAqVNMo2jV7fGmlK0 n2JOmfh/5Z228hFAxEo5N+N3E9Ktv+FOxps7kPO5pzHUWASRMAGMjO4pxIpsb8jb mRczzR0FCcn4tiIGFhK0UwJP0qlpzQDIjsQCnQGlOq//ziPWnhryadxDK25Ans7L JXUrJ0SOkd9wpTktEDkgEMjI6FUqVAP0LK0T/UtOarzbw9UG3rsVxa12BqeIFqUP eXjDxV3Q2n9w+Acnsnx7jkF8zkqlcei4gVqLlHkZ/0HDx0svb7Jv+EHa6NP7DVrT Frr0L27CoNglxQ9gRINuGtOgTdRG9FkybKQZZ38zbqSd/lBpVMC9x2RyQIJBORCh kjz11ufgzL69xPlIl4e8j9SYWX3xhwnffr+Ii2IWCbctxxKwR218/SFEDC89avo7 4wGOg6KDSuCiZbmfHLCtOxhj2lwgTBUWmK7aYVib9o4XAS7ik7rnvZOG2J2C6Xrc EyOog3xkWGOhok6lUnlC/FmlGKZGEMKJ3pVcc53gqjiRJZKpo1SLgnkHgaLfTXvB dskxI/EJJElcS7XL/r1tM75S1TuxujLhmKz+8OIOLoKrDPbZz9kqYSjKvX6mPNUZ Qo4whrJYor7UZ9j7 Extension name: 2z6re5 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6B1393877B10E858

http://decryptor.top/6B1393877B10E858

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3032
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2516
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2408

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\2z6re5-readme.txt
      Filesize

      6KB

      MD5

      1546d78e40dcf010ada38aab323206c0

      SHA1

      c0ddb27acd3c4dde65b2f511a7e038f3366e7f32

      SHA256

      5d08e990a0209565adc18ba28843402161d0451857b772d91256ec0cf5e9a58e

      SHA512

      63c40a2f9db5fccb96dba2a156e412a419a68fffde897411d919748f6dc4b54d615aba12168b6a5573fc7bff1b08f6cb601ea7af918c71bed31a3f95a0ecf885

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      ad2d2a9f9a80e2bee4e978ff5e5a8437

      SHA1

      f8f3c87d07f47cfab6a9e4a2d92c57cbc05174ef

      SHA256

      9326315aa2a06bc413479a5b2c576322fcfa0adfe8f21cb52bf4797e99b5400f

      SHA512

      96ea0ed7692d8689671c325bd968ce3bc790fc4cc0b55cc347e5efb16cbdee16eb81860161b079f49e3cb03b1397d8f11c5d902298826bc1d10656126c027edd

    • C:\Users\Admin\AppData\Local\Temp\Tar14CF.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      192KB

      MD5

      b5faf9ea48b059dc05ec3bf8749f46f5

      SHA1

      f8e943e063f5d2abd72c269ad991fb827fd55b66

      SHA256

      860bc5fdedfead52a6ae2b06fd929fcc90795b90773d5bc1360cddc2fc97e7d5

      SHA512

      b5544f1c8c1964f84b5e0b220148c2b72fbdd047513111e0a7f32d041c91a2da9c6b1f9e995dfe2b414e19f54e6f8003374beb09df42b4231a8587975e880584

    • memory/3032-6-0x0000000001FA0000-0x0000000001FA8000-memory.dmp
      Filesize

      32KB

    • memory/3032-10-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/3032-11-0x000007FEF44F0000-0x000007FEF4E8D000-memory.dmp
      Filesize

      9.6MB

    • memory/3032-12-0x000007FEF44F0000-0x000007FEF4E8D000-memory.dmp
      Filesize

      9.6MB

    • memory/3032-5-0x000007FEF44F0000-0x000007FEF4E8D000-memory.dmp
      Filesize

      9.6MB

    • memory/3032-8-0x000007FEF44F0000-0x000007FEF4E8D000-memory.dmp
      Filesize

      9.6MB

    • memory/3032-4-0x000000001B300000-0x000000001B5E2000-memory.dmp
      Filesize

      2.9MB

    • memory/3032-9-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/3032-7-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB