Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 02:29
Behavioral task
behavioral1
Sample
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll
-
Size
161KB
-
MD5
1a578c9055a1451622017cd253d238f2
-
SHA1
a1b72de550c0012a1c556697ce1d371440fcbc2b
-
SHA256
337fe8b50b6db4e741246ca76f27a8dd4e505cceebf9a9577be2d03dd5c5810a
-
SHA512
f095c5d8e2ec70ce38de23be00c9dc364b24d85506d205832d225c33fb1cae2b8555cc1b52f055d7b69df7ee42c96d9d80699033cecbc06e4fe65334af720d29
-
SSDEEP
1536:7mseS0rh3UharM4WHMnEA0tepkq8e7Pbi4eTMluxtXDCntTnICS4ADEq5tsMzYqV:tsM4oA0tCHLbi4eTMlwDCnuSq7OR
Malware Config
Extracted
C:\Users\sdyp4c4f-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EA0AA6A76DB1E7CC
http://decryptor.top/EA0AA6A76DB1E7CC
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\F: rundll32.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File created \??\c:\program files (x86)\dcecd7ac.lock rundll32.exe File opened for modification \??\c:\program files\EnableCompress.mpp rundll32.exe File opened for modification \??\c:\program files\OptimizeBlock.emz rundll32.exe File opened for modification \??\c:\program files\StartSuspend.tmp rundll32.exe File opened for modification \??\c:\program files\TraceUnblock.wm rundll32.exe File opened for modification \??\c:\program files\ClearHide.ini rundll32.exe File opened for modification \??\c:\program files\SplitTest.docx rundll32.exe File opened for modification \??\c:\program files\ClearBlock.edrwx rundll32.exe File opened for modification \??\c:\program files\ConnectPop.zip rundll32.exe File opened for modification \??\c:\program files\DisconnectRename.xlsm rundll32.exe File opened for modification \??\c:\program files\OpenPing.jpeg rundll32.exe File opened for modification \??\c:\program files\StopEnter.ttc rundll32.exe File opened for modification \??\c:\program files\LimitBlock.pub rundll32.exe File opened for modification \??\c:\program files\MoveResize.ini rundll32.exe File opened for modification \??\c:\program files\StopHide.jfif rundll32.exe File created \??\c:\program files\dcecd7ac.lock rundll32.exe File created \??\c:\program files (x86)\sdyp4c4f-readme.txt rundll32.exe File opened for modification \??\c:\program files\DenyEdit.png rundll32.exe File opened for modification \??\c:\program files\DisconnectLimit.mp3 rundll32.exe File opened for modification \??\c:\program files\ExpandStart.easmx rundll32.exe File opened for modification \??\c:\program files\SuspendSelect.svg rundll32.exe File opened for modification \??\c:\program files\EditAdd.vsx rundll32.exe File opened for modification \??\c:\program files\SearchSend.shtml rundll32.exe File created \??\c:\program files\sdyp4c4f-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointUpdate.contact rundll32.exe File opened for modification \??\c:\program files\FindCompare.dwg rundll32.exe File opened for modification \??\c:\program files\WaitSwitch.au3 rundll32.exe File opened for modification \??\c:\program files\ExitRestart.potm rundll32.exe File opened for modification \??\c:\program files\OutTrace.xps rundll32.exe File opened for modification \??\c:\program files\ResolveFind.WTV rundll32.exe File opened for modification \??\c:\program files\SearchConfirm.pot rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 rundll32.exe 2656 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2656 1456 rundll32.exe 84 PID 1456 wrote to memory of 2656 1456 rundll32.exe 84 PID 1456 wrote to memory of 2656 1456 rundll32.exe 84 PID 2656 wrote to memory of 1312 2656 rundll32.exe 91 PID 2656 wrote to memory of 1312 2656 rundll32.exe 91 PID 2656 wrote to memory of 1312 2656 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a578c9055a1451622017cd253d238f2_JaffaCakes118.dll,#12⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD505106ad4aac0b68e795b1bf9cd746fb7
SHA14cc33c99001882043f47fd16654a426da47173d6
SHA2561691e8605eccfcb13cb7e4a9918ad2938ce2e8775dd9dbd486073f0a1e383b06
SHA512b08ec46d7825119ac11b77a39ab014d87643f2fba80d7f5fb6799cff29abe8a5d935542d3a16b2c9cb3e42d21da1ea997c65326ec84ade6bf46c8e7946ceda7f