Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 23:56
Behavioral task
behavioral1
Sample
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe
-
Size
168KB
-
MD5
275148bda4cdfce06afc24b35ff9dc21
-
SHA1
1a158b97cd5cbf70ac34ac53b88689451f16713c
-
SHA256
637b1a6dccd40e8ae16b78addd3f4f7a3d816210ea67a9f1c7d6efbfc58c66da
-
SHA512
ef6cd57d3c2a5e9b7c2e7b607b463c6b79e9287375cc228ce526ec53b04830795f58d6ba183964606c7033a8b93a2a6d56bf2806bf487b94b4fca84ff17c2c3d
-
SSDEEP
3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaXXQbU8IYz:lw02sJPi7O93NLbLIYz
Malware Config
Extracted
C:\Recovery\9963l-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5D13F2E580B1B29A
http://decryptor.top/5D13F2E580B1B29A
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\L: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\T: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\U: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\M: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\R: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\V: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\X: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\K: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\W: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Y: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\N: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Q: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\A: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\B: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\G: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\H: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\J: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\P: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\S: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\Z: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\F: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\I: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\O: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened (read-only) \??\D: 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vxzq6v7303u6.bmp" 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification \??\c:\program files\CheckpointFormat.xls 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\CompleteRestore.jfif 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ShowGroup.potx 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearConvert.ttf 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectResolve.au3 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ImportOut.xls 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeStop.jpe 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\WatchPush.snd 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\LimitHide.m3u 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupWait.xls 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ResumeWait.svgz 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressRevoke.svg 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertSkip.tmp 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SwitchRestart.au 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files (x86)\9963l-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\CompareApprove.asx 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ConfirmHide.xml 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\DismountConvertTo.aifc 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\EditGroup.mht 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameUpdate.css 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SkipGrant.raw 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File created \??\c:\program files\9963l-readme.txt 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\ConfirmPop.vsdm 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\FormatCompare.vbe 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SaveCopy.crw 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SearchRedo.otf 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SubmitSwitch.mpeg 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\SubmitUnlock.au 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishCompress.rtf 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 2112 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 228 powershell.exe 228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 228 powershell.exe Token: SeBackupPrivilege 896 vssvc.exe Token: SeRestorePrivilege 896 vssvc.exe Token: SeAuditPrivilege 896 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2112 wrote to memory of 228 2112 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 93 PID 2112 wrote to memory of 228 2112 275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe 93 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\275148bda4cdfce06afc24b35ff9dc21_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:856
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58551570f941f83cf98fd618a385de69b
SHA155a04a18f369038b409b4f74a44d769037a9b2cf
SHA2567ba98930aea82a9a2357eed92b7672334513756b9073fa70f65aefd671f6a47e
SHA512d933a80d68213c779eb4557e3fa17e16c2c40b720d4ff30b2c478247c3946597895dd889f0deadc7a28b5bd01595409766e307951b8481140a743dbb0795c8b8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82