Analysis

  • max time kernel
    134s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 15:30

General

  • Target

    13577e7b34a4c62a7a0944121ff84c70_JaffaCakes118.exe

  • Size

    166KB

  • MD5

    13577e7b34a4c62a7a0944121ff84c70

  • SHA1

    06f3daf23dd391ad7e8b8aef613f58cb9baadc11

  • SHA256

    3a6a69d72b533a2e5051973c85a7be5d25f661df01111e17e439126241c9ea39

  • SHA512

    2fcf381f1424336701de4fe631f015eccf8b65ac58909401efb1986f80672571713b0b818b26f2cadb44de8d4e5918ce3865346c42546b8e94286be595879bd1

  • SSDEEP

    3072:1LFrb30BRtBZZg+i2ayy2RjLTuVyu7CJDgoMT3Qfexg3759um6C6lg:ZJ0BXScFy2RsQJ8zgWxI759fbSg

Malware Config

Extracted

Path

C:\Users\7zr2x39k-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 7zr2x39k. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/24088A9F2C6B4CB1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/24088A9F2C6B4CB1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: QtHynPNlIgvozIkmNpTa6fVqf1sJu+22+T10TW8IasIcl0u7q9l+YLXHXutFBa3I PjZBQLchTYC6abfIoGP8aZd9Ibw6jh+fRLQx5hhEQpJc7O0mszcwri5+VtjmEHs+ MMNdsyWnQwmMI/nvPAVX02Ssql2eZ42jwiarUQrzd70XoFEEAaTLi//8rdpPD2vU kNDBv4Fqr6GLUGR+PuwoVHbY6lAgNUeIQQLlaatIik86RajSVaAThXEJ21eQQRNY k4+Qaq6xe1hl0Y4cgyz+BJtjDOtFEL2PJKAnVs4TteKKFnZj+k1rPwV2x0FVrmmx BfjhwJgBez+Z+6Ozs8XpcPHjKN/xIL/l0U13tPyIMNlhWODqO2KfA7AJTDql53Lz f4C4E+P1lmRrDPgeIs3Tn0mc0Bgax+h7BtLL5jBH9o3A7T+vQDNEqzvru7oNXH8D +tqZ9yV9Zmi+LX5XCv2KSKS7dQQ//wkUYIgqIR9nYno/rFvoGXRDZBYOONDpY/aJ xqEwSwM057Jf7BZw48Rv5O4MOXLkUtMzcGqUGx2gWV6sUkDb91l7qJ+zsC5FTtYz TxqK17DClUGILVylqnFcN2lLpwU3SuVqEmZCsE3/ErsWb0zLcqB8p4s1MVDNKjLm 2iwXGH7BRV9/BeryQPrj6nsanT1MPlx2fPnkL+yXQ+PZVs1QboLP8JBtyv4FaGj6 o57dgcTBT1Ev4XOlIEwJaur3Jm79AJgnAlXcAxh7I16Tltb9EPXTTRuMn3fogMBA YGK2FgHx/vSAXnJ2tY579aqDZNj4O0Y/uJoXAgGgWnFO56GpkHwWwYUb2uWumDUj xqBRKKAa8ES/efYVqDWi/D1qyUH7lGmnx9fh8UglKFpqrXVlCgT1+mw3CAwU/VvG TQp0ckrd2zoZ5AqtU4+qfCSXsxp2D9DA3pyUVf36GstgwKqyMqlOWAbxKyaJklm8 IaRAJYTeL4wITAbyH3dAWCFvE3uAKKRMrCrMMyChtMx5i+3sslKQg0ZDzqFx522H s4khkCKxZQaLTh2Uj/ry+NVCW1Yrh03NG3TuvCQ2a8ct2rWD5H8G/2/UBUQAxsdm Cvezw6mhQaOg3AkFwNy1K6RgtUOquczLCZzwG9hsqIn9eJ33AMzLw2I3Z0+3E6NM wZ4RgLWQoydj9p3jyNgJJwSIoVH7zJulmsRRM6Hj3779/Hsp8UeCRFRE4Y7Yp2wn hxxNJJtvW0mG7GOHS9i3YRQeDrluQ75LVXEWCy88q2vJeUtzT0UkxkxjVPm41M+i NUMkZC5fPEpxn1D5KYMt3xmzRgygjukjFCjF44dgMqvtml2tlVTw7pTGIzlaxhhX ST5cggHkDB9tJKCxRQnKA2XTxulHgUC4GWND34B5vBdXLKIS Extension name: 7zr2x39k ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/24088A9F2C6B4CB1

http://decryptor.cc/24088A9F2C6B4CB1

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 28 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13577e7b34a4c62a7a0944121ff84c70_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\13577e7b34a4c62a7a0944121ff84c70_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2248
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2932
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2712

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\7zr2x39k-readme.txt
      Filesize

      6KB

      MD5

      b2132c1144dbfa92c2fe8a036a5ef91b

      SHA1

      5fd3acd4f84316d4574110b473721299de4cd565

      SHA256

      c74028ab834e1a86e433a37d3161c408c43cff5e923e8001f160b700ed205dc9

      SHA512

      249ff8475609d76b39c90ffdb2368b0e8e7001ee3c7dc182a4452b8fc81cfac947edc9c1aca07643f53172be42894863f023e46181d44424c2d634388764b9db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c7b9fdf58f261406dc234a2e912e2b3

      SHA1

      fb1447c9499e0fb890eb1d988342a30a6542fde6

      SHA256

      92d2d2562404d3791341e24ac31d75982b9a5348f2bc8c76aaaca9b11de7c278

      SHA512

      913bab625419eadddc6c5528deaec55bef5a893bfa23adf4e73ade459605083baf78c30987ced2d31ee03bfeeed2814ac031289981e6c432a7a6fe2a1fc4d258

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      36f08b118e5968b19bd47fccea4a77af

      SHA1

      98b46f5588ad45bd8c0ed05543d98a6bca9581ce

      SHA256

      966fb93de8d044dfc151e239bb2cd561f02b78070e37f01af4ea91ad699ebde3

      SHA512

      3884182712b110196bd18f26ef8eae1504499ff7e37319ea18ae2319afafeb88818bf67e9347d7c58b1790801819beaba4eb7582054c3061600689633b6d79b2

    • C:\Users\Admin\AppData\Local\Temp\Tar3864.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      194KB

      MD5

      955af352d0f6b433e28bc82ed08ec16b

      SHA1

      21536ac0f93e3095e295fbf65af5d7867c96842b

      SHA256

      0feca134d10fcaa76adb3277839e88d70f4d4fa2323e0e89d5c6f949aa331bd5

      SHA512

      9abd9f29252eb9f31a08b54898e0e0adaf064d73112a45ee4ba2f4338da9739b428e6a459d43a27bf89ad464a3bfbd57d1963239c7617230e9deeb2a11bbfd66

    • memory/2248-8-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-12-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-11-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-10-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-9-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-4-0x000007FEF5D8E000-0x000007FEF5D8F000-memory.dmp
      Filesize

      4KB

    • memory/2248-7-0x000007FEF5AD0000-0x000007FEF646D000-memory.dmp
      Filesize

      9.6MB

    • memory/2248-6-0x0000000001D80000-0x0000000001D88000-memory.dmp
      Filesize

      32KB

    • memory/2248-5-0x000000001B550000-0x000000001B832000-memory.dmp
      Filesize

      2.9MB