Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 06:30
Behavioral task
behavioral1
Sample
44e5f6b16ab566006f4d970662afc38e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44e5f6b16ab566006f4d970662afc38e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
44e5f6b16ab566006f4d970662afc38e_JaffaCakes118.dll
-
Size
158KB
-
MD5
44e5f6b16ab566006f4d970662afc38e
-
SHA1
67f15baf34ecf32839c441adb55c309bbda173ac
-
SHA256
12096093901347150ac72d6c9c1cbacf4de7d6a51ef1ab4cddc06f85311dd8ab
-
SHA512
f5596ecf863ee98b550b86da3d5e560994dd23827170fec6aaa4dd515ee147d140a24671b35b814303bce4164729ea9d929a4345798997132a7e91aff4c1cf8f
-
SSDEEP
1536:/gAJlgaPladwnfzDcep9O3F7Pbi4eTMluxtXDCntTnICS4AEuzF8gM5iZQ1+mexx:3PwdkzDcC2Lbi4eTMlwDCnuzO/gQw1n
Malware Config
Extracted
C:\Users\v160g73-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0A053683E59C34E1
http://decryptor.top/0A053683E59C34E1
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1113) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\V: rundll32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\57d8acaf.lock rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\v160g73-readme.txt rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\v160g73-readme.txt rundll32.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\57d8acaf.lock rundll32.exe File created C:\Program Files\Mozilla Firefox\browser\features\57d8acaf.lock rundll32.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui rundll32.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\PICTIM32.FLT rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\v160g73-readme.txt rundll32.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\57d8acaf.lock rundll32.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\57d8acaf.lock rundll32.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\57d8acaf.lock rundll32.exe File created C:\Program Files\Microsoft Games\More Games\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\57d8acaf.lock rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\sqloledb.rll rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105232.WMF rundll32.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\57d8acaf.lock rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\v160g73-readme.txt rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\57d8acaf.lock rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00525_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01143_.WMF rundll32.exe File opened for modification C:\Program Files\RedoUnprotect.ttc rundll32.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\mpvis.dll.mui rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\meta-index rundll32.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\FreeCell.exe.mui rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Composite.thmx rundll32.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui rundll32.exe File created C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\v160g73-readme.txt rundll32.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\v160g73-readme.txt rundll32.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\v160g73-readme.txt rundll32.exe File created C:\Program Files\VideoLAN\v160g73-readme.txt rundll32.exe File created C:\Program Files (x86)\Common Files\System\ado\ja-JP\57d8acaf.lock rundll32.exe File created C:\Program Files\VideoLAN\VLC\locale\57d8acaf.lock rundll32.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\57d8acaf.lock rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086428.WMF rundll32.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\v160g73-readme.txt rundll32.exe File created C:\Program Files (x86)\Common Files\System\msadc\ja-JP\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01183_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\System\it-IT\wab32res.dll.mui rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-mx.jar rundll32.exe File opened for modification C:\Program Files\Windows NT\TableTextService\ja-JP\TableTextService.dll.mui rundll32.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\Sidebar.exe.mui rundll32.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00369_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00543_.WMF rundll32.exe File created C:\Program Files\Windows Sidebar\de-DE\v160g73-readme.txt rundll32.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\WMPMediaSharing.dll.mui rundll32.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\57d8acaf.lock rundll32.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\57d8acaf.lock rundll32.exe File created C:\Program Files\DVD Maker\de-DE\57d8acaf.lock rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF rundll32.exe File created C:\Program Files\Windows Media Player\Visualizations\v160g73-readme.txt rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1780 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2988 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 276 vssvc.exe Token: SeRestorePrivilege 276 vssvc.exe Token: SeAuditPrivilege 276 vssvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2144 wrote to memory of 2988 2144 rundll32.exe 28 PID 2988 wrote to memory of 1972 2988 rundll32.exe 29 PID 2988 wrote to memory of 1972 2988 rundll32.exe 29 PID 2988 wrote to memory of 1972 2988 rundll32.exe 29 PID 2988 wrote to memory of 1972 2988 rundll32.exe 29 PID 1972 wrote to memory of 1780 1972 cmd.exe 31 PID 1972 wrote to memory of 1780 1972 cmd.exe 31 PID 1972 wrote to memory of 1780 1972 cmd.exe 31 PID 1972 wrote to memory of 1780 1972 cmd.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44e5f6b16ab566006f4d970662afc38e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44e5f6b16ab566006f4d970662afc38e_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1780
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d579ebc5ac7603676fc79027a5c9e230
SHA1358c1eb45a2a6cf455fad14396af8cb67809bc9d
SHA256a0a74a487f9cd6036dfd68ee6dc44278561b09d614197ca42e9f60fb5e7fc9d4
SHA512c6dfe6723c6b205598a2ffd1a9b31e65f5ec3291b8591f800e9e9fd650ec218a93d9cbd80dc386cb399136075f2335c68c1dd27b4c8796950f348510ad14b185