Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 16:13

General

  • Target

    6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe

  • Size

    161KB

  • MD5

    6000b457610de78f95e1e4f1bdca7752

  • SHA1

    1f5c7dc950dc36a3853229256ece8d4f493d0145

  • SHA256

    158b1e1fd5719cbe6fc125d17020d0d6fd1365ef3b6db69941380e5f4c34a8ce

  • SHA512

    8a8b54ba89db8a5a6247ab1ae8cd0e53ea730fbe9c18900023d186250a67f024dc1f7916efebf9c6c33a0f63ebf5ce7f02a52e6abb294eddf39fe19273e75e88

  • SSDEEP

    3072:Hp5SexkWi1Lbi4eTMlwDCnu/q0FvbVl7Kr:JvGWwbnWJ/Z77m

Malware Config

Extracted

Path

C:\Users\5x740k1sct-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 5x740k1sct. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7477DE763EB483F4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/7477DE763EB483F4 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ex+mOoOCfirHKBTs0QvKtT+fYmhoryEJGgS6bFdfZJJDbN/qZZFWLi4fIqjAhq5L Ex4/XMwJcsywa5Mf+xzuJzOF4TUPEO3t0ykoF2/eCIa1tflmG4ZffZR2361GsLQy jZy4k+zPcWjJwnlGnWR40+6w1d39iSwVjweRYXjMWL+0JYOwFA/drjs0xKG8BJXo tm2i7QI8AD0X7CtAs+jYXQlXm/TfwnSf2m/3b2YVbUQ6jr1HMWtJUcgWLxHsk5Mx nFSMYXUsCvVADvSUJb0f7Zt84mNgbUCAV1pef+kQmXq6+uTMO9IOZLSGxxDQouro rGcmpXG06tYpY9fMXer8wthWeMRT+oj+dzLtwatnbYUJUhkKVWumIcUGVvR5n3Uv 659SKFRaG0dx/X3r0YQNISKBH/e9xvkiRUQdGyQaX3MoFfEo0GoH6lZ8yol/bn/S OcC6eQi4RvzWR8Y0psHnvJ/qo9y/rF2BPoR20ftsFVuUVJfw7FkuZnDT9vumcOEA RV10f2y1pu2+Kb9/IZvNoCE/6KFYDpzlqkknGw+TR0dhINndxF4pa1Bdm98YOyRy 05tD6ns28eSa/zsE/7IgAZiGNbA0ljRFu2fyScLu81xjw0zBenmsjF4IwxDXBSGm +a87mZVRN9SZQbhqW7vX7rwQEQbQLkZ/20u3NqSXjvP8qCSSEdlpT4LGb+55savC pZXdYb+TtCLfXbo85tOMu2JlJwF5WVbypBNON5ZrNIK6eLLM1WXvAEUnC6Xl8WIH 9zqa+Ybp6El46LbLXQhW8aMW7dyQDpmYqxWNK0142uSo5SBQW1wx8MvE7kITQgVv 7STXNPkBhPXntCf8hmVWJfe+svxItuSrlkXcUWHbRlLDa68NVnv2+32z8qHQQkoH EwKPC1ZdjNyeTDnC/P28vL8Ggla1mVSBNfVD1XGl3xqMAKUyegnMApmvvOmuFaZN /U79impUUSR0sqYegxdwxyYpBEVNHaMrKoycnfwlDe/+a7z+5TSaEZVIZPJ6LBlV 6HGN+sbqDSrbP0kfLEq2kQq54Aw9x2BVUVXd6caXghbrxbvNCPxV0wZ0w/mQxBKj 4D5H/lmth76Mhd27gMZhSzgEpXy91Z4i1HZh2XQ9zARZ4WkL1Ji1aFeI7SW7ovUP bDojMG5mNdew1TZj1Wa4VdLT8PVa3aW4F66Zw5lojJwtgxZ72VutOj4oarRKAMtt f1tUcYr6O5U3T/Dy79+JxKyD Extension name: 5x740k1sct ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7477DE763EB483F4

http://decryptor.top/7477DE763EB483F4

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6000b457610de78f95e1e4f1bdca7752_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2784
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\5x740k1sct-readme.txt

    Filesize

    6KB

    MD5

    92d01b9eec60bedfbc7652dc4b55919f

    SHA1

    1fa0a4aad0d4428c5a8c5ee77880497e2d1c1298

    SHA256

    e285fde9403a039608114b1272464f5f554ac58a46543b7e7216a89861c2f8f1

    SHA512

    d9a2197e4afb0914cb18f8ffe12b8eaaa7b59b50c7822679da493cbc853e04b8549064763ba72fc7b5524346d49487fe4741c565cf84bb8f5afbe63c6ad1e8f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec62d816d40ec2ffe8832942006b78c1

    SHA1

    928fddee34d3854be32d9aab00859e9ad91bd2f6

    SHA256

    d0d3344d926a1c2e2fefca1481950cd4e4b3acf8f3cb85819f5b4cafe09b0dda

    SHA512

    ec2a8c2d891e0f4e93563d06aaa57efbfe9047a5d8959688f1b043c1d56dbe912dc16cb218ef9b8d6b185f1df7ec4b4c2bdc9dc8aa47b151545707560233f628

  • C:\Users\Admin\AppData\Local\Temp\Cab476E.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar47FD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/316-9-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/316-8-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/316-7-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/316-5-0x0000000002640000-0x0000000002749000-memory.dmp

    Filesize

    1.0MB

  • memory/316-4-0x0000000000160000-0x000000000017F000-memory.dmp

    Filesize

    124KB

  • memory/316-3-0x0000000002390000-0x00000000024BD000-memory.dmp

    Filesize

    1.2MB

  • memory/316-11-0x0000000000130000-0x0000000000136000-memory.dmp

    Filesize

    24KB

  • memory/316-0-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/316-10-0x0000000000130000-0x0000000000136000-memory.dmp

    Filesize

    24KB

  • memory/316-612-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/316-2-0x0000000002100000-0x000000000219F000-memory.dmp

    Filesize

    636KB

  • memory/316-1-0x0000000001FA0000-0x0000000002069000-memory.dmp

    Filesize

    804KB