Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll
-
Size
114KB
-
MD5
19fe9989b89a24d2fe76644b18944b60
-
SHA1
ff210251d7832da9661cce50aab2dfb379046aae
-
SHA256
6b8fe4a62fb03dee5dc0802cc168197f3289a5786e1f10729ecbb1678dfa9378
-
SHA512
b65e62d7a09450bc1a38728e89dbe2d2d9420fc71c83254c266db424e159f38b1442f3c2e907a27b5ea7af630482edfea7751c87e766afcd6dcb909a17edce8c
-
SSDEEP
3072:tx9vinMBNZoMIw4ayMteYFJ0uwA9dDoX:f9vinMPrIFajLlrkX
Malware Config
Extracted
C:\Users\n096bo0kh-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F6672909D3AFEBD9
http://decryptor.cc/F6672909D3AFEBD9
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\M: rundll32.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification \??\c:\program files\ExitDeny.vsdm rundll32.exe File opened for modification \??\c:\program files\MoveEdit.gif rundll32.exe File opened for modification \??\c:\program files\UnblockApprove.asp rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\n096bo0kh-readme.txt rundll32.exe File opened for modification \??\c:\program files\AssertShow.ppsx rundll32.exe File opened for modification \??\c:\program files\CompressInitialize.xla rundll32.exe File opened for modification \??\c:\program files\MeasureFind.kix rundll32.exe File opened for modification \??\c:\program files\ResolveBackup.php rundll32.exe File opened for modification \??\c:\program files\ShowRedo.au rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\n096bo0kh-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointHide.wav rundll32.exe File opened for modification \??\c:\program files\GrantExport.dwfx rundll32.exe File opened for modification \??\c:\program files\DebugUnprotect.csv rundll32.exe File opened for modification \??\c:\program files\DenyStop.dwfx rundll32.exe File opened for modification \??\c:\program files\SyncLock.wax rundll32.exe File opened for modification \??\c:\program files\WatchProtect.mhtml rundll32.exe File created \??\c:\program files\n096bo0kh-readme.txt rundll32.exe File opened for modification \??\c:\program files\CloseGet.txt rundll32.exe File opened for modification \??\c:\program files\JoinEdit.wav rundll32.exe File opened for modification \??\c:\program files\MoveConvertFrom.xltx rundll32.exe File opened for modification \??\c:\program files\PushResume.zip rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\n096bo0kh-readme.txt rundll32.exe File created \??\c:\program files (x86)\n096bo0kh-readme.txt rundll32.exe File opened for modification \??\c:\program files\InstallStart.001 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 rundll32.exe 1700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2348 rundll32.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeBackupPrivilege 2468 vssvc.exe Token: SeRestorePrivilege 2468 vssvc.exe Token: SeAuditPrivilege 2468 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2192 wrote to memory of 2348 2192 rundll32.exe 28 PID 2348 wrote to memory of 1700 2348 rundll32.exe 29 PID 2348 wrote to memory of 1700 2348 rundll32.exe 29 PID 2348 wrote to memory of 1700 2348 rundll32.exe 29 PID 2348 wrote to memory of 1700 2348 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19fe9989b89a24d2fe76644b18944b60_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2524
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56ae0fa1c3efc31ad7647ac7bd1738c60
SHA1301bbcf3a5b7bd9f3746cf83654ebe6557690ea7
SHA25650aa7d30e18e597d02e29010c33b1228bcecb59acb1cc80059705dbec13aed91
SHA512b680d7dd246809862d7f775dcc8b17be22b6cb9cf2fe1657a3e6e075cb041bc51d940cc86ef4b303f8f19d56fc7e13c7323a9bb418691dd7b9ec91fdaaff04bf