Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:06

General

  • Target

    6bf8720c0741f11219f38e747392b73e_JaffaCakes118.dll

  • Size

    164KB

  • MD5

    6bf8720c0741f11219f38e747392b73e

  • SHA1

    73030215c499f6908f418266bc1c522fdc2462df

  • SHA256

    1e1589de70ea7ebad976aa1c1ebdb32e0695ee268aa5f7f8ac834ed3960a4803

  • SHA512

    b90e78c1e011ac347b9fd86e6415312a242854f84a1a0956c513333819a6bba773e5ec74afaeaf374c05410a88bb54d22f48c1de7682e21a9bd961387c62379e

  • SSDEEP

    3072:BrX1t2U05pbJ5xhxY9doh7O79siUs/Na2ez+SKnTLBvA:BrltH05f5v2i7O93Nde7cT

Score
10/10

Malware Config

Extracted

Path

C:\Users\tvkh0f-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension tvkh0f. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3CBAA057DA4B6F66 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/3CBAA057DA4B6F66 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: RtngtmSagjqGnmwaosUc5qQwUxNvNbGz+ZTK61iCGRDx5Wl7WoHTuRdMWY6py6My ewXBxeIMxYrrgADjJsnfvYWVmUp40Phs0CqiHy0/NtCgQt3GBB8o3tR4+ifGJVTH y54ZPcpT/gjZBg0kJOgKJETzQoxqmi6xqyMJLrnmI3V/pgKUA9NF9F6p7iGHGSiQ 8saQilylLCNWGKYL+QKuae++KnlYtaUlFo5pXT9QwrfMXX4qiKi5IhTB7LIjkotM 6gS5vHFo0GzeDxffOqkYcia/K6zV1vOjb/PnF5tk2jinnpqu8eL0tmhbSwxCZqfa 1PYt6UdqtoFvQjFFQbWY2asvHT65YP1xreXp4UujK7eCRPQN9POGVs2BvusJv/Td RcJ1NFGkcVcls2o3V5ttWeB3wS+yBPPUvdqrsi1/+fN94oBgxWqpK7tt7IyOmHcs sGQx4ebAf+yLytVOjsfFNdjDcjC6tjpx0SfWtlHBgNepuMZL1TJpOPUmCp0peHTR /z/R0psg0L4B9kSY2+OTUVm5wKLwVIrrXrgYHeuj3h7KKvhCKxjUxfj5ymUmTfKZ 260LX5zTZslcL42zkitmuixUie3y0JRnpf3c/dnmICqni1LhQPfKKP6eEt9JgozG 42PPw4q60TzP5IufqoXYYKIHm7tIP+Xj42Jzp5pfPjbgdQ0CCoPwwDKZ3iaBViqm dFRkZEf45wKHyXE6Dcwqwo6F0C5EpaYvyX2JpjhC8F/MiKZxG2JeuUr4ItrVlLa0 t65sOopJhk9F1A4SZO25r62Z6eS05WlAIc7d4rnYfUPNnu2tP2FTBWxxf3S0WNS5 2CVS+4rEGFbhYbMb46k789IQG9T0fIms0anGk0EzDS7dEAbb0voWhIKAz7jVxmYs bnPaBwk3lo9FgyI679VtE90L9+L/Pbbh+RnpJ9/pVdMwuq8imsKvKYtejvWa15or XRFbXeKjjG95S6dj8GD9bgEStRLCHWLNRgbSr8wgbMcF+VBsh8S8PIf0RuC7MfjT SKxWgOMUCATmBgsuGKMYJX1V2tLugaeknDNgklL76Gd6v+vkqgpQJxiDWuSERW13 mDgZ6aTMlxBhLYkcdNUORz6toBOl1carS2nahqeeTEg6n4ARzOQ2o86/zAHmqMPw OlPWmrrd+v9TXVqjGHRsXqQV5KeXq9lQFiVHGCKzpoGv9BicBEl6k9nfUyLoL4An Txaf/uU/LXyjifRbr7EfDlAo Extension name: tvkh0f ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3CBAA057DA4B6F66

http://decryptor.top/3CBAA057DA4B6F66

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf8720c0741f11219f38e747392b73e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf8720c0741f11219f38e747392b73e_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1412
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3mjciign.vwj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\tvkh0f-readme.txt

      Filesize

      6KB

      MD5

      37d0519535a823f88cfc662530d9995d

      SHA1

      869b6119d72110565be9a307e61325d44f8ca1d6

      SHA256

      289fc56a14353588362d2736808d5fe1ba9a59539c80e9b3a13c9b2884b75d72

      SHA512

      c8bbecc2cc2167e75cd66ab66a71fd6dd1d66dfa1745ccd89c97a31690fedcab39342505da8ccef1bc39d848a002891bcd6566c655ad4cf392e5201656f093e4

    • memory/1368-0-0x00007FFC5F393000-0x00007FFC5F395000-memory.dmp

      Filesize

      8KB

    • memory/1368-1-0x00000271CE780000-0x00000271CE7A2000-memory.dmp

      Filesize

      136KB

    • memory/1368-11-0x00007FFC5F390000-0x00007FFC5FE51000-memory.dmp

      Filesize

      10.8MB

    • memory/1368-12-0x00007FFC5F390000-0x00007FFC5FE51000-memory.dmp

      Filesize

      10.8MB

    • memory/1368-15-0x00007FFC5F390000-0x00007FFC5FE51000-memory.dmp

      Filesize

      10.8MB