Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 04:58

General

  • Target

    2865ed46578bf51a1656064c7375b94d_JaffaCakes118.dll

  • Size

    166KB

  • MD5

    2865ed46578bf51a1656064c7375b94d

  • SHA1

    fef692d2dcfc799b7399d88372fc5470c1ffc8b2

  • SHA256

    ba11d5592a54787bae50a01afa3cef0f57b67ac4ba603525abb56d3260a5b6ce

  • SHA512

    6b491507bcbe7259f59c3a1079e9bc02febe007e30a448bec1c1f4bd9e1ca4b646175c46eef83df3c4e084049b9228390674e6dcae737cc2bca7a3c70d6b3728

  • SSDEEP

    3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfmVvdOyY26bL:Ww9vteqJggn7oUfodOTL

Score
10/10

Malware Config

Extracted

Path

C:\Users\10y625-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 10y625. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D4444FB4423B5F8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/6D4444FB4423B5F8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: eSd3tcR491QAAQlSWJESoY/eYwKDh2wKE9kXO8vZvhRGGP7bDRn/wxZE9rBtusgk bPUhGZp/q1L4DJKR29UODN5YrfIa8C3dLwa5RmbktlHBmTJtBICyrX7i1qnz7xVZ LImnBe/yBguHG64VwvwLFcOC6gyvE3Li/Q4GuLh54R6QrNhZ7hdvVEXHlhpdMyAM kBA+XLV2+cskYkqakDxhKNjt+N4ppGIwMtTSMrIxCwFugnS4KyqUuwlGdWuNO70N 4rvWA1qs6CKoCHtrtt2pwTO8yur0jH9rblkGV9/u+G6oshYqMKx9GI/p4Y79OQ0S 1JSPrI5NYus4VyqgHqJEfG9cc0qgDGTep4FwRB6dBKwWsZveTuuJecH7WXniblg0 TfME0ixI9LDTTyg21W2QJJzQyDOO7eA8HpowVUcG+ruvjdOUbHdtsOeCYlGxJbeD DbjDKy4qDCmSh289pb4iplv3vaQ6Jo3RyNLcw4V7+hs4L+Ot38vaMEY1yAD2I7va W8pMqYS8Tl0EDr3yMh8zTGD0EteXn00ShVlqMOYJiuhIr5InCoGRBskKkRK0NY5y Gh1/FGWp92R+jlSPm8KXyvmIal/xJYRzVDboIPKutc4o96i6bsgqxkX/R61lvucR TrdI4GB3Dnzjt70IAY+OHI15HtSIYKtlq3jspGJOVy0hEiD59J3hvxkafdR32ZJT UzhRvMuAvBSRVRSL9Ul1LYRvjyGGCuJsOBbcDYzpmgLpInVZsaq3zQ/K4R1XqxQD Aztx4OnAEuO966iWqPNHZ7UOKv/eyAdZGekOgqtIoo5oVsN3HbMZZjmBoiGA8j8Q y1XrA1RLUQftqs9tGNXP1vfSOOCrmSDXMb+5AYdpW2j4WApSy2Z9QWlKVG6aVsXD NfUuIkE5QrbEslEzNNtlFaurORFxpXI2dtNP7dIGhJReT6qBqpHzEoK1S1kXQTip jb6fbdeB5UP+yXIju9fsHDEISMPbFFmiMONEXsqAoI8GSJDRDUS51Vn9BvzjuyQm 6hVkrlPb0mxLC2znWDrT2mEZSMAJRVGl8BFysXSbVzSUeDvjHggGOs6AfBqLhanb bfowtY8iribAzmgqgebc0Zk3byXpQojxJRRSkj2Zsp1VfSssz2iqIqaDr66LPiUH wG4QIGiSbA5uUEZIGOv2dD0CdtzxNKcZF2Vx1aM/VqkKhoDrQtfClq4LZnEpcReF eK5RltFsvUDag7jgQ+AW4IQsEk47x1y6KN/DvCpf04hr4JpY50GOkpVgrqiXbujr CoswT4u7ahy0/kJb8K+Da/Cmr5XhXvGc9VT9ujZY0r3VIGGsdnR86PFtrOLjWEGB 6ym5mCpUnPAqeTYqI/kPqxhNeK6mwNNSPVpsCH8LOrmCML/MjAw= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6D4444FB4423B5F8

http://decryptor.cc/6D4444FB4423B5F8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2865ed46578bf51a1656064c7375b94d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2865ed46578bf51a1656064c7375b94d_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2224
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\10y625-readme.txt

      Filesize

      6KB

      MD5

      dcc653baa7ab718a6a6b4147d630d9a6

      SHA1

      c75ca03794c9a98adf677c4b4d3160e99154f0cd

      SHA256

      00d00ac264ce57407a731493f7f1ff164f4989c29a857c167b142e76c2b97df5

      SHA512

      62e9b2c03d7679dec642ba9b048cc63f136b6eab81aa49ee999a7916bdb5a9f26ee3abbf2ec43df6748d93dd6cf6727f5df0ce79edf850d29337942a81d97048

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bznzlxub.0bi.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/3492-0-0x00007FFD82403000-0x00007FFD82405000-memory.dmp

      Filesize

      8KB

    • memory/3492-1-0x0000024EFACD0000-0x0000024EFACF2000-memory.dmp

      Filesize

      136KB

    • memory/3492-11-0x00007FFD82400000-0x00007FFD82EC1000-memory.dmp

      Filesize

      10.8MB

    • memory/3492-12-0x00007FFD82400000-0x00007FFD82EC1000-memory.dmp

      Filesize

      10.8MB

    • memory/3492-15-0x00007FFD82400000-0x00007FFD82EC1000-memory.dmp

      Filesize

      10.8MB