Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 23:37
Behavioral task
behavioral1
Sample
2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe
-
Size
161KB
-
MD5
2c448be318e53757eeb78e1a1ec2245a
-
SHA1
072d3c8b6bb946acfe17656071faec4bac7c8b46
-
SHA256
c5b521000c1d318921b58f7b5db3a067d28e6badd304ea9085831af8985b9fec
-
SHA512
bf6614f3ac3556b3d049bc4192e49680025758174bb2c0873fe5967f8bc3e29f82ae2046876f1502c3db7adf51775ff7b2c34ad9c9cdea4e7a16d23f6f4e7f91
-
SSDEEP
3072:oRud7cQgLbDkQjKiNLDIFjKbnSEg//b5Y7H:o0qQe52GIFGH8bK
Malware Config
Extracted
C:\Recovery\079fs2468k-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/62E52E1E68834A71
http://decryptor.top/62E52E1E68834A71
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\Q: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\K: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\P: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\Z: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\F: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\N: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\R: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\T: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\W: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\A: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\E: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\L: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\S: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\V: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\O: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\B: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\J: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\Y: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\D: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\G: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\H: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\M: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\U: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened (read-only) \??\X: 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\q879z.bmp" 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification \??\c:\program files\ClearFormat.rmi 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\CopyStart.wmv 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\EditSelect.asx 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\RevokePing.avi 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\TraceRename.xlt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\HideResume.ADT 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\TraceInvoke.rtf 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\RemoveApprove.3gp2 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\079fs2468k-readme.txt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File created \??\c:\program files (x86)\079fs2468k-readme.txt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\CompleteHide.xht 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\MountRepair.asf 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\PingStep.css 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\RevokeBlock.mhtml 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\UnregisterMerge.avi 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\GroupMount.shtml 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\PopRequest.M2T 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\PushConnect.7z 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\SubmitWatch.xhtml 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\UseInitialize.wm 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File created \??\c:\program files\079fs2468k-readme.txt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\AddRename.asf 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\ApproveFormat.ps1xml 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\DebugOpen.jpeg 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeOpen.mpe 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\StepProtect.mov 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\UnlockGrant.3gp2 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressInstall.vdx 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressStart.xml 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File opened for modification \??\c:\program files\UpdateRestore.cfg 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\079fs2468k-readme.txt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\079fs2468k-readme.txt 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2648 vssadmin.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3016 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1260 vssvc.exe Token: SeRestorePrivilege 1260 vssvc.exe Token: SeAuditPrivilege 1260 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2260 3016 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2260 3016 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2260 3016 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2260 3016 2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe 28 PID 2260 wrote to memory of 2648 2260 cmd.exe 30 PID 2260 wrote to memory of 2648 2260 cmd.exe 30 PID 2260 wrote to memory of 2648 2260 cmd.exe 30 PID 2260 wrote to memory of 2648 2260 cmd.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c448be318e53757eeb78e1a1ec2245a_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2648
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50884e9bda108c1a7128dd33d24e0e46c
SHA1d7533ffed05fa86606b6d656a56f0b5a32fe534a
SHA256b2c541ffa840632482de04147c46332e82091bdf327649f7e746623683bde3a8
SHA5124a82076586e5fb855d077e9980ee596f410793cec0969415368517f0690c055f83cd4d56e8a99eac9c3225f4e8274a7e5aa4b0896aca2577da54f83815eed8a5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a