Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 15:53

General

  • Target

    355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    355e7899e9b1c032865ce0e2b98a257a

  • SHA1

    cb96abf6a6172feb9e95fb08981a44332cd06ea5

  • SHA256

    a207ef339a7b12a825bd9f5fc6349e6c1ec130dbcb48d663d0d1fc91a534aa0d

  • SHA512

    18bb8f91153fcac63881e189f0e40301f49b21018b66b6b560e80fd8b843c27610bf59bfbfb804cea98b07a32f4bc7cf31c562589307ba6f938531addc9e9d21

  • SSDEEP

    3072:sr85C3oFiWjmfb+HP+rnRfUqW1Am5T+8WCdHwJK3Bc:k934jmfCHWtUP1Am5T+LCNwE3G

Malware Config

Extracted

Path

C:\Users\j9gm95x-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion j9gm95x. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4718CCCC021282C7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/4718CCCC021282C7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: GIkzBLcIJIOESXN3P3rD407q+OgyKnf1FjTwqOj9/gycQRovgMca/eekmTA77Xoy qeM4doYQBnNVO/VSVl9AqfnZ/z+eiWuRVd/UYAnbIb5ZIknla4D4fjpkNjsPJp4V 5eE3Amk+8SRONihzTipjdOmbIhjNjSoNGTtn/jK1QqFz2j91Gk1EGv86DNWgK7H6 K56daTS1jrJbyZzKADEeB4PeN5lFsoKlW8UfMKJrb4WFrRja/me2dlJda4OzDxF4 tKIetVtQj//3Lpdt12eXmjwUT2vY7V5DqSroMjIlYmg8l0zZHfJTEIaQP0NnPd4G TCcJ7oezedWrCnnm8YoGLbwpZYMxr0vngGTwRIsBjg8oPBEcDsK/wrPPrHqFUxoY hdeUtea3FH/2xpeZjio6/M7QzOsZ2rxZuaPZP1tfizz7XPNX5eYbNw3PQm7x+BvO EeHJc2iMHWTdE1w4yGbnoiVeE7dtlx7ddNhqmrqhekak5PfzI0QjonElUHoorTTq VJLOo88KvNPsq9o1J8R+zPqQQBt3j0/B444ThBvqg/wYIagkTaLReWWHYKsmxbKd 03hBW5+e8dMFQMQKWOUa7KzAreZWId5lxF0e/4/zdhnilaGfBP+C9t4Qf+ucK1p3 xQAUOBaGJthoQvd0IdvN7F7x9VcMeX/s7aEa0OFeejVF2XdeJqPZT1hUrh4xTRxD SlnunuueIEThEatV4faM+IvOQ2qPGj1XyoigJKBSoNdTTM4/UWSXMXYsFFWEj60X urZMNAk1Ljae+ywtkTEtV+PeUgCdlSnCkSnUWXzSjQnyjz0VJfaJJTPIzqnoz5h1 fP2ZrjJpG61z/xPOv04zi5YVhyb560KHi/BSgJim9gbLs6QUP3hSO5GZcgeFeSfz +8Nz/ZZlop5oFakw1f0FpnfykvrAP5oDxy0Ht1DrV5G2yiuQ8Q7vjONtpFO8sSm4 6Xa4QBot5gGYIXZGmUYWtqJMlG+J/bVlbHNCjqueZ/bHU8sWTxGKrUoLBx4iFXX2 EKAb/iBYjtyq2WoTOBriXzEpdD9KtnPYNwAp3HtB345Gt5AXDpfku+Nctu/b+bYi VuxLuG8Gi3mlhzU55UeAkE0MeesCQalcvAmdj5PyiXZt4gqU6en2ZtmDYViqvw+K HUzOsco/vRbDvUUbzues0PcBOOFlHwvs12zYKkuUzwsD5a5PQ9zmnQbsITQ3LUnm AoP2t+PufpW2PWL3WIhf8g== Extension name: j9gm95x ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4718CCCC021282C7

http://decryptor.top/4718CCCC021282C7

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Sodinokibi/Revil sample 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\3582-490\355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1188
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4868
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
      Filesize

      86KB

      MD5

      3b73078a714bf61d1c19ebc3afc0e454

      SHA1

      9abeabd74613a2f533e2244c9ee6f967188e4e7e

      SHA256

      ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

      SHA512

      75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

    • C:\Users\Admin\AppData\Local\Temp\3582-490\355e7899e9b1c032865ce0e2b98a257a_JaffaCakes118.exe
      Filesize

      164KB

      MD5

      1eac0f4ac60cc30b6b448dc102fdf825

      SHA1

      149a8f379faaca8c79b00256584a9c9aa6bf0639

      SHA256

      26df34c6b83ece197977c432fbb033da55d117d3018df939adf5b0927fcec83a

      SHA512

      6f9e3b21cf74670a7fadcffea5aa55401014cb65d93949b42305b1142d67d58d01f35d2d5769730bb07437c5e8d36176df594192d5ea518c3e7519c770ee3aeb

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3joid1pv.zwq.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\j9gm95x-readme.txt
      Filesize

      6KB

      MD5

      9abd838e3a705af7c127481d7ac60950

      SHA1

      6af80e93983a13b734164bb2bb258864d446e2b0

      SHA256

      1586a9d080cab529d2cb0d7f25c573a629b601ca53aeb683cfb0501d684b8f91

      SHA512

      df763105107a35a5ff6cf7b7794ebacc61e3d7036136a895e3c727c94a299f550a95f6e072a8e49e5daffa0d641d6289e4f9b0c411f15e74a2ed540b57e4190c

    • memory/1188-96-0x00007FF8E3D63000-0x00007FF8E3D65000-memory.dmp
      Filesize

      8KB

    • memory/1188-107-0x0000018A4DC30000-0x0000018A4DC52000-memory.dmp
      Filesize

      136KB

    • memory/1188-106-0x00007FF8E3D60000-0x00007FF8E4821000-memory.dmp
      Filesize

      10.8MB

    • memory/1188-108-0x00007FF8E3D60000-0x00007FF8E4821000-memory.dmp
      Filesize

      10.8MB

    • memory/1188-111-0x00007FF8E3D60000-0x00007FF8E4821000-memory.dmp
      Filesize

      10.8MB

    • memory/1472-491-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1472-492-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1472-495-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB