Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
-
Size
166KB
-
MD5
2d5012a0dcdb72409842b4606ec0ac48
-
SHA1
c6044b3b1d6b65be9fbec84846efa25cd8c30242
-
SHA256
7aaf4b2e40306cbb65edd0aed85a61ef4bbe538837684f48eafefebbdb871c11
-
SHA512
3f837cee85d9136cbbfce1cb13fd855d10893b8d898123930c46b99ebb4ed4a5c2d0a4f653e403b1f5f0b26601f330ac1d9c95766dc7e1483e393ee1919eb64b
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfRWQwOy8CwvD:Ww9vteqJggn7oUfRWoyBwv
Malware Config
Extracted
C:\Recovery\98cewz97v5-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/322748F3E378EF88
http://decryptor.cc/322748F3E378EF88
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Y: rundll32.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\program files\UnblockReceive.dotx rundll32.exe File opened for modification \??\c:\program files\AssertBackup.vstx rundll32.exe File opened for modification \??\c:\program files\GetSync.xlsb rundll32.exe File opened for modification \??\c:\program files\ImportUninstall.mpg rundll32.exe File opened for modification \??\c:\program files\NewImport.jpg rundll32.exe File opened for modification \??\c:\program files\OutClose.doc rundll32.exe File opened for modification \??\c:\program files\ResetDisable.xlsx rundll32.exe File opened for modification \??\c:\program files\ResolveDebug.ADT rundll32.exe File created \??\c:\program files (x86)\98cewz97v5-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompareEnter.otf rundll32.exe File opened for modification \??\c:\program files\GrantResume.vsd rundll32.exe File opened for modification \??\c:\program files\MeasureRedo.ppsm rundll32.exe File opened for modification \??\c:\program files\SelectMerge.txt rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\98cewz97v5-readme.txt rundll32.exe File opened for modification \??\c:\program files\InstallMerge.crw rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\98cewz97v5-readme.txt rundll32.exe File created \??\c:\program files\98cewz97v5-readme.txt rundll32.exe File opened for modification \??\c:\program files\ApprovePush.avi rundll32.exe File opened for modification \??\c:\program files\PushUnpublish.dwg rundll32.exe File opened for modification \??\c:\program files\RegisterRestart.dotx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\98cewz97v5-readme.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 rundll32.exe 2996 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2212 rundll32.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeBackupPrivilege 2708 vssvc.exe Token: SeRestorePrivilege 2708 vssvc.exe Token: SeAuditPrivilege 2708 vssvc.exe Token: SeTakeOwnershipPrivilege 2212 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 1776 wrote to memory of 2212 1776 rundll32.exe 28 PID 2212 wrote to memory of 2996 2212 rundll32.exe 29 PID 2212 wrote to memory of 2996 2212 rundll32.exe 29 PID 2212 wrote to memory of 2996 2212 rundll32.exe 29 PID 2212 wrote to memory of 2996 2212 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3016
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD549a1ae4ea179ad76520477bbf9e79cf5
SHA1a96210d9a6440d6928a658680e278816795eba9e
SHA25612c70fc0ac4f81113f7b8562cb8ee183b0a48cca788dfd4eea717adc324f5bdf
SHA51268feb1b4e7516b90cdac5dc2525d2e1c0785fc3567934fb3104638e58eb736da5acdd6821498d6748134017505ce18cbce2037e6699b96e6bf2738677efc8d84