Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:41
Behavioral task
behavioral1
Sample
612b61376219736601d49d2001645b30_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
612b61376219736601d49d2001645b30_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
612b61376219736601d49d2001645b30_JaffaCakes118.dll
-
Size
164KB
-
MD5
612b61376219736601d49d2001645b30
-
SHA1
86840cdd42c8aec339575a1d0e3fc784d3ad445c
-
SHA256
008d0c1a4e83a37d34c14993a6d76c18ae13c03ba54d12e1246fb1495a20e2a6
-
SHA512
1c48f5fba28504ae7e176053cf4ea127fb763e16aed7a34ee002a541072903e0fbf55f5090069da776030e0b153474948deced137d1b71152ac20adb7e15e728
-
SSDEEP
3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfamVw3O1:veoUeZR2TRCWQFfamme
Malware Config
Extracted
C:\Users\28y7qg1913-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5356259464F878BE
http://decryptor.cc/5356259464F878BE
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\Z: rundll32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\RevokeOpen.odt rundll32.exe File created \??\c:\program files (x86)\28y7qg1913-readme.txt rundll32.exe File opened for modification \??\c:\program files\ClearConvertTo.asx rundll32.exe File opened for modification \??\c:\program files\ConvertFromSync.mpg rundll32.exe File opened for modification \??\c:\program files\GrantMerge.M2TS rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\28y7qg1913-readme.txt rundll32.exe File created \??\c:\program files\28y7qg1913-readme.txt rundll32.exe File opened for modification \??\c:\program files\EditSubmit.xhtml rundll32.exe File opened for modification \??\c:\program files\UpdateBackup.htm rundll32.exe File opened for modification \??\c:\program files\CompareSync.sql rundll32.exe File opened for modification \??\c:\program files\SearchInitialize.otf rundll32.exe File opened for modification \??\c:\program files\SelectSync.xlsm rundll32.exe File opened for modification \??\c:\program files\FormatCheckpoint.css rundll32.exe File opened for modification \??\c:\program files\SearchSplit.wmv rundll32.exe File opened for modification \??\c:\program files\BlockSet.wmf rundll32.exe File opened for modification \??\c:\program files\CompressReceive.pps rundll32.exe File opened for modification \??\c:\program files\LimitMove.cr2 rundll32.exe File opened for modification \??\c:\program files\PushDisconnect.easmx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\28y7qg1913-readme.txt rundll32.exe File opened for modification \??\c:\program files\DebugSearch.emz rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\28y7qg1913-readme.txt rundll32.exe File opened for modification \??\c:\program files\GetUnpublish.aifc rundll32.exe File opened for modification \??\c:\program files\GroupRestart.wma rundll32.exe File opened for modification \??\c:\program files\JoinExpand.mp2 rundll32.exe File opened for modification \??\c:\program files\OutTrace.vst rundll32.exe File opened for modification \??\c:\program files\ResetPing.TTS rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 rundll32.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2316 rundll32.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeBackupPrivilege 2748 vssvc.exe Token: SeRestorePrivilege 2748 vssvc.exe Token: SeAuditPrivilege 2748 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2028 wrote to memory of 2316 2028 rundll32.exe 28 PID 2316 wrote to memory of 2132 2316 rundll32.exe 29 PID 2316 wrote to memory of 2132 2316 rundll32.exe 29 PID 2316 wrote to memory of 2132 2316 rundll32.exe 29 PID 2316 wrote to memory of 2132 2316 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\612b61376219736601d49d2001645b30_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\612b61376219736601d49d2001645b30_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2740
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bd2dfb1c68d4471a3f9dadd28c1e37c3
SHA1f2c9f28603e03ba78b7132e77adcd1bedec75cb7
SHA256ffc6871acdaa6c62a0c9e49af759e0b7285f4c9e9aecc34e8addddcf7cf93832
SHA5124fec9495b32b55eafa7d66badcba0a8e54c3624600e293b1829511218b47a83e7af643ad5c84b55ac4d79d6f72a8dd4d936aac1d98b269c6571778080398f59c