Resubmissions

01-05-2024 16:41

240501-t6493sdf43 10

01-05-2024 12:24

240501-pk4dfagh25 10

Analysis

  • max time kernel
    66s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 12:24

General

  • Target

    0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    0bcaab2d6aae4221ae17527874cd1167

  • SHA1

    682cef7ee433feb06c1db1d445f9618eeff5eb95

  • SHA256

    dd7c40b211a54f1c860c85af0f488cf3aab9608041294f281261b636b59e494d

  • SHA512

    72a089cf1294ef7fc6d2f0b3e706e46b99be97bbb9f018f45f5c954673006f3f8bda683f7b62f0de91202f5873ff0abe23befc8e2558ef3283c6d13e74a9e08e

  • SSDEEP

    3072:70XoUeZ/DVS8L7flcMTeYWikGLvFfdL+qaXgOvGwZxC4:7eoUeZRlcYxWYTFflnaPvGe

Malware Config

Extracted

Path

C:\Recovery\6gwih79pu5-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 6gwih79pu5. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/61CEAD67D8CE1D66 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/61CEAD67D8CE1D66 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: JFtIoWjNKo7ch7akwCgj0qDf5qOBHf7Du5dEjO8QLvzpdhpLD4hxEhnvXGjoXjYr huMHMwAtbVOETjYPcZ/RyxwyL5B1a8uMikrd5iAke19O6khdK0QbFMtltPset/zx BXFh9xp3yTG+jhfHD31N6ydLEt9hnMChXrbNo05VVNQU5rcsbvlpwfoBiyWVnPIg Znu7TS85COB9rEbUR2QUX/Q5dyfg8hSpWH2OZxWNc8bFzUpCEfTda20YwoEUG1Hf 8s3GwWDhEGzJ9+iYdEN2qE56eaBRQruywPJ2Yi5mMsZ+Jm45NKMFr2NHVmMKF1nx Bg53X/rRIYPMFuqCulmaQoSF/ixjnUwGqNdxK15lqB+NYZkwUR9JmvOQnPhopA2P 2SebueTPScK/GB+kOFTl9fWQGrqiPbbBb5BdnOE+NR0qyViDIjvmcbNv5LLGqwO4 F7wQWFlNPCcNGeFENaa9nXQPw9QplMWk4DHL1+3fVggDPtLGnU/Bj+q7ey/zc0b9 Qdl+cmgFCSElxjt3fMiQPs0r/+q0dI3VBDSkqCsthUksy+ndjCwJ2QMuIcVvWb2L 2vdEEUmAX/MWp4S4E/2oOW0HCHZX4qYSg5O1SrUQTpImswCMtpg+HAEX//4VdZyg 6r2EHTrR4h7oPVxM09geYmxtIm9dWjmJJJ+UxpY4FOZzAlT7htThG7L0y7eSrRYk dk4BKJ9dltj/9SiRiFq3ZJeptPZTezo98IkBoiRxeIp0sIniNtbcz6en3GJVYSJ1 t9PZdzVpMP9up6UTGv6sH6o1Amke51xNIt8rPBlS6KozU5io2NsouvMhVw4ovL7W 6CunHGi8DXjqcBwS+MO32ZcNYVReTZ523mwyMkNCSGkI7UdM3bPrPwryOWl9GfLH kcfWQEeAXxx89epNA5RmH/VIFUfFMJ0ceZHSDG1MMKEY+6nqZ49WM3GgfvfRkb3C 8BeR0G6Y5igOJ2f6AqpEZRw/0epNfATebb4JS14Ymh+ROsd4qFg/mCmN5XJfSWxm 8aZT4QWmQlK1lp2p6QL5AcTezKEoSnNbIYtUqkdB4ILgmnHtd+BjlV3OsAsiV7Dx 5lSMacGGedmbitOAf+KXPFviJohC05ex2WSgBDZik8OVyr5Ode1qu1YPdFXjaCBy Z9gU2WohcHDteLup08ZGNzAfd4po4OlPQg7ByxTw03CjsH6mPjWZXeCcWXw3A1xd CRz2EvEle0qOQ+YGEdCm4I1rfmJOm/R5/6Y= Extension name: 6gwih79pu5 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/61CEAD67D8CE1D66

http://decryptor.top/61CEAD67D8CE1D66

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0bcaab2d6aae4221ae17527874cd1167_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3960
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:5064
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\6gwih79pu5-readme.txt

      Filesize

      6KB

      MD5

      1ad3affda7ce5907fd267e3a4bd05131

      SHA1

      694356c81adf2608370e2da5e608287781a3dbb7

      SHA256

      835c88d0d006e1747629147f18d009190db1515c8928d3e8ae1d7bd76c638a04

      SHA512

      7b797586c53341ccde0265f41e5439774a25a32d266f9b68b7e558fca3da81c69904b93155f0ee8a711436fb084603a1fbd73bfef9845b605c4cab18f8f91aca

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vz2kaki4.qcs.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/3960-0-0x000002677C4B0000-0x000002677C4D2000-memory.dmp

      Filesize

      136KB

    • memory/3960-10-0x00007FF98DA00000-0x00007FF98E4C1000-memory.dmp

      Filesize

      10.8MB

    • memory/3960-12-0x000002677C3E0000-0x000002677C3F0000-memory.dmp

      Filesize

      64KB

    • memory/3960-11-0x000002677C3E0000-0x000002677C3F0000-memory.dmp

      Filesize

      64KB

    • memory/3960-15-0x00007FF98DA00000-0x00007FF98E4C1000-memory.dmp

      Filesize

      10.8MB