Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 16:13
Behavioral task
behavioral1
Sample
6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe
-
Size
161KB
-
MD5
6000b457610de78f95e1e4f1bdca7752
-
SHA1
1f5c7dc950dc36a3853229256ece8d4f493d0145
-
SHA256
158b1e1fd5719cbe6fc125d17020d0d6fd1365ef3b6db69941380e5f4c34a8ce
-
SHA512
8a8b54ba89db8a5a6247ab1ae8cd0e53ea730fbe9c18900023d186250a67f024dc1f7916efebf9c6c33a0f63ebf5ce7f02a52e6abb294eddf39fe19273e75e88
-
SSDEEP
3072:Hp5SexkWi1Lbi4eTMlwDCnu/q0FvbVl7Kr:JvGWwbnWJ/Z77m
Malware Config
Extracted
C:\Users\5x740k1sct-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7477DE763EB483F4
http://decryptor.top/7477DE763EB483F4
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\J: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\N: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\O: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\Y: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\R: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\T: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\F: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\G: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\K: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\P: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\A: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\M: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\Z: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\V: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\W: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\X: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\D: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\H: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\L: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\Q: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\S: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\B: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\E: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened (read-only) \??\I: 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d628pkf.bmp" 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe -
Drops file in Program Files directory 55 IoCs
description ioc Process File opened for modification \??\c:\program files\ResetPing.dwfx 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\TracePing.temp 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\5x740k1sct-readme.txt 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressSearch.rtf 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\LimitPush.docx 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectMeasure.emf 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoStep.mpeg 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\UpdateOut.xml 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\62161c73.lock 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\MountMerge.ogg 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ReadInvoke.vsx 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\UnblockExpand.nfo 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoRemove.mp3 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressReset.jpg 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\GrantMount.DVR-MS 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\MeasureWait.mht 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressSwitch.cab 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ConnectClear.m3u 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files\62161c73.lock 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\UninstallSplit.temp 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\LockSplit.pps 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\RevokeMerge.mpg 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\SuspendSend.mht 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertFromEnter.js 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\EnableStop.mp3 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\RemoveInvoke.pptm 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ResetReceive.png 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceoledb35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearUnprotect.bin 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearUnprotect.csv 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\CompleteInitialize.ttc 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\RestartDisable.xlsb 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\5x740k1sct-readme.txt 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\62161c73.lock 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceme35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\BlockUnlock.htm 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\5x740k1sct-readme.txt 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\EnableImport.mp2v 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\SubmitDismount.raw 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlcese35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files\5x740k1sct-readme.txt 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertTest.xla 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\InitializeSplit.emz 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceqp35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\GrantGet.html 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\SplitEnable.mid 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\WriteBlock.dib 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceer35EN.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\5x740k1sct-readme.txt 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceca35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlcecompact35.dll 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\62161c73.lock 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\MeasureCheckpoint.wav 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File opened for modification \??\c:\program files\RequestImport.dib 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\62161c73.lock 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2784 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2768 vssvc.exe Token: SeRestorePrivilege 2768 vssvc.exe Token: SeAuditPrivilege 2768 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 316 wrote to memory of 2388 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 28 PID 316 wrote to memory of 2388 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 28 PID 316 wrote to memory of 2388 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 28 PID 316 wrote to memory of 2388 316 6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe 28 PID 2388 wrote to memory of 2784 2388 cmd.exe 30 PID 2388 wrote to memory of 2784 2388 cmd.exe 30 PID 2388 wrote to memory of 2784 2388 cmd.exe 30 PID 2388 wrote to memory of 2784 2388 cmd.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2784
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD592d01b9eec60bedfbc7652dc4b55919f
SHA11fa0a4aad0d4428c5a8c5ee77880497e2d1c1298
SHA256e285fde9403a039608114b1272464f5f554ac58a46543b7e7216a89861c2f8f1
SHA512d9a2197e4afb0914cb18f8ffe12b8eaaa7b59b50c7822679da493cbc853e04b8549064763ba72fc7b5524346d49487fe4741c565cf84bb8f5afbe63c6ad1e8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec62d816d40ec2ffe8832942006b78c1
SHA1928fddee34d3854be32d9aab00859e9ad91bd2f6
SHA256d0d3344d926a1c2e2fefca1481950cd4e4b3acf8f3cb85819f5b4cafe09b0dda
SHA512ec2a8c2d891e0f4e93563d06aaa57efbfe9047a5d8959688f1b043c1d56dbe912dc16cb218ef9b8d6b185f1df7ec4b4c2bdc9dc8aa47b151545707560233f628
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a