Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 06:17

General

  • Target

    53550156f5250bc445aedad91fa9d665_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    53550156f5250bc445aedad91fa9d665

  • SHA1

    2fec5aca3bdaf419f12795491b70cd7f8fa8371f

  • SHA256

    13857b32be96e622e1416dab5bac7a65042f5cc5ab8b094ddc7421838d2f2adb

  • SHA512

    34caca932ae9e63d5e3ed22369901eb4a3ca68ff9d3c1825c2d47db5530f54c203de7916d256a09bdaab85145a9d64a1ac22e2a957436cc2765747550701b054

  • SSDEEP

    3072:X440HvCjLbi4eTMlwDCnuMMf4crzUxc0+NP:I46v0bnWJSezMc

Malware Config

Extracted

Path

C:\Users\Default\1lgkv-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 1lgkv. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/43F09B535E512F0C 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/43F09B535E512F0C Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 0hVRZ3UPSWEWDswCuoMQ7B14AQaPlcGrTczCW5H7LL1hxkEVY+7aQTnke33ehWxM R9eofqeGPBt3lW/4UfymvzK1US+v2V7okNuXRL0Rp0kJMLO8tDA1sMurBIi0yKgr aZvHOoJGT9FClAMClAdBTjpWSwAad9YyG8tZi4eeHjTIKqUuUpg8PpVfd0WQcPLv wWCn5jvglQPJvl/BnpoY7dLYmvvICyrSRXryB1gKMFj2oCQbSkCc2QpM4N/yMAhQ mfev7OcpXH0WsfwBMYj5VAm/V3RYhyFV5zqVKUru7u7sAF/q497cpxXLMn+vqCs1 C9AxDD0m62l7RmMYiljEc/uf4M31PU2DLyCxDJq02/ch86WCyNDcrusEHrT+1tYN ZeszJShllmiKhwDgwZsthyEBbIG3kYhovoiMd2bt7twCw+7glF7L3BthyP30qio2 nn7LiglitakQE5kpP/jekJdApFJ5+zdkzx6A5aqZqS2HgawPWFFttzG+qXBavLrn hFISI16tQmdUTnrFcpvflywjMJvBgopF/2Wts8d6Jwf4KqXaVfaPX+CkIcaqVFdi IP63U5J8/PxI7aXPlQOmU/+YFu9/JqLv3bf7uBI4eoS3eMqXH/0iiqFLKu1WArrQ ih91AH5+3jhXfMgH4uNlBDq+HDILJuuZyJUwmmQIGmHB8BFLq+ER/nCepoxfC7qy h3xcRK686A4LqiE9iEgt1j6pRSmlxYA9P1S3lURNs3b9V+MV8y/7arId4972Kns8 J6T8PDwgYx9L1T7MImM5MdJWqJgsu3q6OKGydAhNcedGzNLdx0iUxf0vd6GTHlmA 5oIRCUPbSPW24xfWTpnkkt0szAmrHntQWidVHF9XzBVS142oaT/juhnao9gNUd7P ZYU5ih8KPF+iuYoLQSJTwTXkvUIBcQAmejslKPPFmKlm7P1CK2dqwc9ySpnUKQ4z lvkkjJsNFpj9R0coSTheagO19iXvLuIciVxoTFsEuXeOpC/7QBcMfUkM2IrxzUTI iqw/DxFQxcpme62glO0xXtVopzJDzNX8LBK41XeBCcJv5y0Wc9Ybek+Pj+5aic10 g6Qbe6nzQ8N1+naDMD8hEbOr79unMlEE1EKT7VGPTG4QqFe9zeSg4wtpYSzlAt3X aEZfYRpjaEoP8tF2aPmFYJW1n7eMddKt Extension name: 1lgkv ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/43F09B535E512F0C

http://decryptor.top/43F09B535E512F0C

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\53550156f5250bc445aedad91fa9d665_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\53550156f5250bc445aedad91fa9d665_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2572
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79c8118b234de1b1c2392baecfeeb6ae

    SHA1

    5169c8196aab0c33fbca52674e29038385d373eb

    SHA256

    b284db45e3b5ec75a8f766962b41b394d88a004290414b53af32185fec7a179d

    SHA512

    c862d23f68c3c03198f0caafb6569c11d97196404c95e4a31826020abaad18119a69c89da74baf2a701058d7f2b31a6cd50718699920502de1e2b2270d1568b0

  • C:\Users\Admin\AppData\Local\Temp\Cab9CAF.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar9CC1.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Default\1lgkv-readme.txt

    Filesize

    6KB

    MD5

    8d82313a67d6ef04d8660e4ba921847a

    SHA1

    5d440c516e57906f3f544e7b212cfc2407b9a2b2

    SHA256

    2b499879d98675bc830e5f6854d28ef48f68899280373f5373d56ebf6eddc26d

    SHA512

    f0cbd5793b023cea0f83a9b09721d447e37137027350c6c4d8dd8115af8f0e8ffb1a07103c80c94f045e6ff3cd7b388661f73f9ece2e9aeb1d19e4e432797a0d

  • memory/2916-8-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2916-7-0x0000000000820000-0x000000000083F000-memory.dmp

    Filesize

    124KB

  • memory/2916-6-0x00000000021B0000-0x00000000022DD000-memory.dmp

    Filesize

    1.2MB

  • memory/2916-5-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2916-3-0x0000000002110000-0x00000000021AF000-memory.dmp

    Filesize

    636KB

  • memory/2916-4-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2916-2-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/2916-11-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2916-0-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/2916-9-0x00000000025F0000-0x00000000026F9000-memory.dmp

    Filesize

    1.0MB

  • memory/2916-10-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2916-1-0x0000000002040000-0x0000000002109000-memory.dmp

    Filesize

    804KB