Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 00:53

General

  • Target

    19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll

  • Size

    114KB

  • MD5

    19fe9989b89a24d2fe76644b18944b60

  • SHA1

    ff210251d7832da9661cce50aab2dfb379046aae

  • SHA256

    6b8fe4a62fb03dee5dc0802cc168197f3289a5786e1f10729ecbb1678dfa9378

  • SHA512

    b65e62d7a09450bc1a38728e89dbe2d2d9420fc71c83254c266db424e159f38b1442f3c2e907a27b5ea7af630482edfea7751c87e766afcd6dcb909a17edce8c

  • SSDEEP

    3072:tx9vinMBNZoMIw4ayMteYFJ0uwA9dDoX:f9vinMPrIFajLlrkX

Score
10/10

Malware Config

Extracted

Path

C:\Users\n096bo0kh-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension n096bo0kh. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F6672909D3AFEBD9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F6672909D3AFEBD9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 8OY8JF55X9QD9TnTGtbWaziiQNa1hm56FuZY5586hKZydiC2WdXOQebogtun1oZe Y1pbPNloMnskXwHzlODtU3u/8GQxoT6TEDdxpo9DTvNJkRrS91tWFaCF3XQ6vlgy u03fuWzNiOihjHwZS5L3dliYSew5Cboj5KeKws85WI78fg7S4184fuQyraReny5I haunvg+tMPPDYjemu/ne62sEcSnJfiy3EELDMuCklwrgfm1TFFbqo3NblBxNSuyj E14NPnhmL62hLHzIhfT+4U9hQi9NYrTrNsaam5tM4LYg0XHrUsBHx6Qjl3EV7VN6 0YKK07lxgdJaGAjQdgki8JKKW/tcxmp/9hc6F6rHD6sIRa89zr7RSIIdlT+ppAse smfM/BO2WjxsRp5yARZdfXR12FUs3aXgABB4h6+LoeLSpW2hFYg6MOfReuOtitFG +cfyFHvzBn0FSX1nkO549vQG/xsWXsXpm0dYcxVVEpPjvXbWKYlF9RGQNK9JB75U ZpH6UZT3Hwkb67gs0k9QISVvXs0s+Zzlc/hZXi4jcNIo7zWyEixj60s8IhTd9Cu/ IZS+Kr2TO2aSIG09XU6Zvt0R3FPS0+Pg4gb9jTNvDRFGV59y7h4zO3EPt/gOQSvw FFCRrTemejOPjmao2V6lNAb0IcPY7B1CR4ihtqQIbBmTQJKSk4mHSV2Wner9WG6z ji2VK4fXVtczs4QvsuXKyjw9xjZiAI2jSu7/wvYKN+Q2QSp1h8VCIXG5OGFMBIOd 62eEVZLohYcParS09uLUjCTo4q2kbIIxgJ4kflGFsQEFJNDtVXqAwFZyCYr3SMDl ER/ikz3yqb5DFYOMJxnzxSpnzJ7t3rQnOeLSVLfXE2fJz4xXwnaUjhnIdMPV0W6t YZv2hZVVMac05A8qgZPMmOJnJNnPyTABw+SwlBwifi0JX3oMtnMkdGJVDe1QUvwT bkr+UkfhQ0XXxdBcMQX12OJADAYSN98AatpV1Ae2R0T4lfCIw07fVy+KPYdI00Ho 6VgQ3TniIQ+tcFsPN0V0XIvMH7lJoIvJhoZO9z74wSzK58NH5+ePL6LGtcfFW7/p Vt/C9rsEXw6t6MqZLcDNPusW7QrGj4U+dJCwN1pQTXKe2Y6nEy6ccZarjmCQLaR0 kl8VAg5fCmVxUwHJAjecXfrt7j+0kn035FWwBi4lINSiToW/qpR0f33fNzOVtyah I3XD36C/n9vOPjuPoiCoQSCyh/RFK3wGGNcpvAUaGrYN7POu9A4KMsxhm+n9a5p3 DdPOSlFGkSNQ3kQ8QKhJb7UcFbXDNHwk/4xMEOokkMkquVwNX2umkO0QRGr43fSE CsA5Pwf3Gy0R+b1KSjbTP281XONUvfTb9w4ddieP00NI0dx+DVc= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F6672909D3AFEBD9

http://decryptor.cc/F6672909D3AFEBD9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2524
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2468

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\n096bo0kh-readme.txt

      Filesize

      6KB

      MD5

      6ae0fa1c3efc31ad7647ac7bd1738c60

      SHA1

      301bbcf3a5b7bd9f3746cf83654ebe6557690ea7

      SHA256

      50aa7d30e18e597d02e29010c33b1228bcecb59acb1cc80059705dbec13aed91

      SHA512

      b680d7dd246809862d7f775dcc8b17be22b6cb9cf2fe1657a3e6e075cb041bc51d940cc86ef4b303f8f19d56fc7e13c7323a9bb418691dd7b9ec91fdaaff04bf

    • memory/1700-4-0x000007FEF626E000-0x000007FEF626F000-memory.dmp

      Filesize

      4KB

    • memory/1700-5-0x000000001B730000-0x000000001BA12000-memory.dmp

      Filesize

      2.9MB

    • memory/1700-6-0x00000000029E0000-0x00000000029E8000-memory.dmp

      Filesize

      32KB

    • memory/1700-7-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB

    • memory/1700-8-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB

    • memory/1700-9-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB

    • memory/1700-10-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB

    • memory/1700-11-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB

    • memory/1700-12-0x000007FEF5FB0000-0x000007FEF694D000-memory.dmp

      Filesize

      9.6MB