Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
-
Size
166KB
-
MD5
366809d2d9ed25f5cc201660542fa9db
-
SHA1
9ee1d0ed426c36a0cd5df47d954ca39c892ede35
-
SHA256
f860a3c27f44b98d953d05da28a474945b308a1b83d83ae7e6d4c20d1c06b30b
-
SHA512
04cc3fe1b01b760c8f7f28ecfbb704989252346768656c11fa28878e0738ffcea50c4d023290f8cf61d9e944b3a4312275b34ede0dc8a39c67eb316c40d54592
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QlGLMlPso:NJ0BXScFyfC3Hd4ygMS0
Malware Config
Extracted
C:\Users\d4q8h-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3822E06E9D7CAEBA
http://decryptor.cc/3822E06E9D7CAEBA
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification \??\c:\program files\ProtectFormat.nfo rundll32.exe File opened for modification \??\c:\program files\ResolveStep.contact rundll32.exe File opened for modification \??\c:\program files\SkipRedo.rm rundll32.exe File opened for modification \??\c:\program files\ClearResume.au3 rundll32.exe File opened for modification \??\c:\program files\SplitImport.pdf rundll32.exe File opened for modification \??\c:\program files\UnregisterInvoke.M2TS rundll32.exe File opened for modification \??\c:\program files\ConnectGet.ttc rundll32.exe File opened for modification \??\c:\program files\FormatWatch.m4a rundll32.exe File opened for modification \??\c:\program files\InvokeUnregister.php rundll32.exe File opened for modification \??\c:\program files\PublishConvertTo.3gp rundll32.exe File opened for modification \??\c:\program files\RegisterProtect.DVR rundll32.exe File opened for modification \??\c:\program files\ResumeSet.mpeg3 rundll32.exe File opened for modification \??\c:\program files\PushSwitch.htm rundll32.exe File opened for modification \??\c:\program files\UnprotectEnter.asx rundll32.exe File opened for modification \??\c:\program files\ResolveRead.ps1xml rundll32.exe File opened for modification \??\c:\program files\SearchOptimize.mpv2 rundll32.exe File created \??\c:\program files\d4q8h-readme.txt rundll32.exe File opened for modification \??\c:\program files\ClearRequest.7z rundll32.exe File opened for modification \??\c:\program files\DisconnectReceive.midi rundll32.exe File opened for modification \??\c:\program files\EnterSubmit.pub rundll32.exe File opened for modification \??\c:\program files\MountSwitch.vst rundll32.exe File opened for modification \??\c:\program files\RedoUninstall.asf rundll32.exe File opened for modification \??\c:\program files\SplitConnect.ADT rundll32.exe File opened for modification \??\c:\program files\CompleteRename.html rundll32.exe File opened for modification \??\c:\program files\CompleteSelect.midi rundll32.exe File opened for modification \??\c:\program files\NewSubmit.csv rundll32.exe File opened for modification \??\c:\program files\ReceiveApprove.odt rundll32.exe File opened for modification \??\c:\program files\SuspendMove.contact rundll32.exe File opened for modification \??\c:\program files\EnableLock.ini rundll32.exe File opened for modification \??\c:\program files\JoinImport.m1v rundll32.exe File opened for modification \??\c:\program files\UnregisterMount.mhtml rundll32.exe File created \??\c:\program files (x86)\d4q8h-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConfirmCopy.mpv2 rundll32.exe File opened for modification \??\c:\program files\ExpandEnter.wma rundll32.exe File opened for modification \??\c:\program files\OutInitialize.emz rundll32.exe File opened for modification \??\c:\program files\SwitchUpdate.WTV rundll32.exe File opened for modification \??\c:\program files\WatchUninstall.wm rundll32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1328 rundll32.exe 1328 rundll32.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1328 rundll32.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeBackupPrivilege 936 vssvc.exe Token: SeRestorePrivilege 936 vssvc.exe Token: SeAuditPrivilege 936 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1328 2848 rundll32.exe 90 PID 2848 wrote to memory of 1328 2848 rundll32.exe 90 PID 2848 wrote to memory of 1328 2848 rundll32.exe 90 PID 1328 wrote to memory of 1952 1328 rundll32.exe 95 PID 1328 wrote to memory of 1952 1328 rundll32.exe 95 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4128
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4340,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:81⤵PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD552fbf84fb104cbe905f1bca6b68766a7
SHA1c009e7398a90834fc20482b4529c64ef86a33de0
SHA256144a877b5348e116464ab3e34f50dbf49fb63390e11adfed6d1b01c4e58d6e57
SHA512089d710750a2f38cea0259067c61726d95b51fd5fd3e6cef97a160eab58d269750107699abac976e3248c9941c67619f860c9da31a0763786780dff06157c2c2