Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 08:59
Behavioral task
behavioral1
Sample
456f237fece3615ed4eaf4b7cd4bf75c_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
456f237fece3615ed4eaf4b7cd4bf75c_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
456f237fece3615ed4eaf4b7cd4bf75c_JaffaCakes118.dll
-
Size
164KB
-
MD5
456f237fece3615ed4eaf4b7cd4bf75c
-
SHA1
8348f8350ff9a0d4a95ac46ea51f434dbff19404
-
SHA256
3bbebbba9d302fc277c1107fd05218cf92087bfa5246509cab6e1fc6eab12012
-
SHA512
febb0ac4e67423c6a83d21b124a04a64e7323fba6626d7963bfb1dcb7c0dd1084788c3e9efebcd4bda908bc6b96ad2ee52b9c8ada56d5fec2235774a0350bd29
-
SSDEEP
3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfqboC0K:veoUeZR2TRCWQFfYoDK
Malware Config
Extracted
C:\Users\8uv1o99bn4-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/18762A4030310B8D
http://decryptor.cc/18762A4030310B8D
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\D: rundll32.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File opened for modification \??\c:\program files\UnlockPush.mpe rundll32.exe File opened for modification \??\c:\program files\WaitUse.dwg rundll32.exe File created \??\c:\program files (x86)\8uv1o99bn4-readme.txt rundll32.exe File opened for modification \??\c:\program files\DebugGet.xls rundll32.exe File opened for modification \??\c:\program files\RevokeDismount.ppsm rundll32.exe File opened for modification \??\c:\program files\SplitSuspend.scf rundll32.exe File opened for modification \??\c:\program files\SwitchWatch.otf rundll32.exe File opened for modification \??\c:\program files\UnregisterClose.docm rundll32.exe File opened for modification \??\c:\program files\BlockConvert.snd rundll32.exe File opened for modification \??\c:\program files\ClearInitialize.html rundll32.exe File opened for modification \??\c:\program files\DebugComplete.sql rundll32.exe File opened for modification \??\c:\program files\InstallFormat.tif rundll32.exe File opened for modification \??\c:\program files\RenameUninstall.wm rundll32.exe File opened for modification \??\c:\program files\UpdateRestart.wm rundll32.exe File opened for modification \??\c:\program files\DisconnectConvertFrom.xhtml rundll32.exe File opened for modification \??\c:\program files\ExitWrite.mid rundll32.exe File opened for modification \??\c:\program files\MergeSplit.asf rundll32.exe File opened for modification \??\c:\program files\SuspendEnter.m1v rundll32.exe File opened for modification \??\c:\program files\UnlockSync.html rundll32.exe File created \??\c:\program files\8uv1o99bn4-readme.txt rundll32.exe File opened for modification \??\c:\program files\LimitRead.tif rundll32.exe File opened for modification \??\c:\program files\UndoAdd.mpeg3 rundll32.exe File opened for modification \??\c:\program files\UseOptimize.png rundll32.exe File opened for modification \??\c:\program files\CompleteShow.vdx rundll32.exe File opened for modification \??\c:\program files\ConvertDismount.rtf rundll32.exe File opened for modification \??\c:\program files\GroupJoin.shtml rundll32.exe File opened for modification \??\c:\program files\SendTest.avi rundll32.exe File opened for modification \??\c:\program files\BlockUnpublish.css rundll32.exe File opened for modification \??\c:\program files\CompleteEdit.TTS rundll32.exe File opened for modification \??\c:\program files\ExitOptimize.dwfx rundll32.exe File opened for modification \??\c:\program files\InitializeDebug.dwfx rundll32.exe File opened for modification \??\c:\program files\RequestSwitch.mp3 rundll32.exe File opened for modification \??\c:\program files\RestartMount.pptm rundll32.exe File opened for modification \??\c:\program files\SearchUnregister.asx rundll32.exe File opened for modification \??\c:\program files\AssertWatch.DVR-MS rundll32.exe File opened for modification \??\c:\program files\CompressRead.clr rundll32.exe File opened for modification \??\c:\program files\DismountJoin.vsdx rundll32.exe File opened for modification \??\c:\program files\GrantSend.vsd rundll32.exe File opened for modification \??\c:\program files\HideGet.asp rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4016 rundll32.exe 4016 rundll32.exe 1632 powershell.exe 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4016 rundll32.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeBackupPrivilege 904 vssvc.exe Token: SeRestorePrivilege 904 vssvc.exe Token: SeAuditPrivilege 904 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4016 4240 rundll32.exe 82 PID 4240 wrote to memory of 4016 4240 rundll32.exe 82 PID 4240 wrote to memory of 4016 4240 rundll32.exe 82 PID 4016 wrote to memory of 1632 4016 rundll32.exe 92 PID 4016 wrote to memory of 1632 4016 rundll32.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\456f237fece3615ed4eaf4b7cd4bf75c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\456f237fece3615ed4eaf4b7cd4bf75c_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1360
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD529436725bbf10da729dfc4fe3ab17f81
SHA1c3c750fb3e3df1865f0fd694f13dee44b1481d26
SHA256dbe416ce600d218e02d101de75288b2fe8437c627e7b546722b381aa0ec6352f
SHA512ade1b21c2d545e78500f434755d0f05c4435ea050b6df701b4d6e9523bddb9ac2963f8bc5f72cdf5ff9130f86fcf4712765ba3e5d748dfda6217b7f44f57ff53
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82