Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 02:48

General

  • Target

    7419fb7e3354a8d3fed0213d888312ae_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    7419fb7e3354a8d3fed0213d888312ae

  • SHA1

    bbfe9e30414da1a127c65ed6915e30131dd6db81

  • SHA256

    df1b009ed5edf9d754dd6e1f8b4918c55260eb6d91d1c8bbcf909afa2e2c9919

  • SHA512

    342d58371a58a1f3361dfaa51e27623d3a835782a196f0daa2349ecace963611ac2e839006be1db42ae6b4f591f591661ee062090ea8b2fd7c8a028fc1496072

  • SSDEEP

    3072:oRud7cQgLbDkQjKiNLDIFjKbnSEagbje61A8U:o0qQe52GIFGHJ261BU

Malware Config

Extracted

Path

C:\Users\34f69-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 34f69. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F6A946E7E4664445 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F6A946E7E4664445 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: UjBSFFo3mY5cfRMQyp5ppt5GgBBfLIRxDqVgChf81ZOSh1ODcLMLtCuYk1+UWnJS FgjZAgJOgtcQZ5vT88zOn1L+76w4qvsC1zt2fuOPcl3LvB66dkaUiGfcFiAeM7zE wG/qrPhL1955LUPno12cy+ZGdvS4FE1islsv8oPlJlnNnzA5jLsG5CuPm46v05cS z+KoHS4dbqzDmdOsB4HUeJIkVfr1OY7r8K2QHOkctSAVVpZV9TcJfxFm/VGblh+4 5tqhXQSyP2CDhLWelxEkY/d9zBdaKQ/DoQHNcCty5XsW/WVZphQj7IeVsLFzNumx hNLXn8PrYo2tEr/Ip7AzOI7/mX3VmcB8LrrHr/czKB6CloAoFEzg5ftPtJHjhC8l hu2iXpeQHtAy5E4Z6l4pzY4ydo7+LObKJcPj9U9k4DWb0Hb0M52pElExddaThjYx OXxZI0BxNHzpPqADdmf3s+ABL31aMakMZNGLCHkNuDlLj4vmJRHMmFTam7WTNdaJ cyTir114gqkQv1isnujCXSIhmEYpTYQzF1+KonW3VIL0dr8zTjIArVDDw9rtox5d N5yzC8wbo4Bfe/3fk2yZ8lyhMvyEE7VkvtoUOCOvao3ci7UOLSuA76i8E4TtzwJh q4dqAHWZG2xTlVT1nl416skOHFLheR91E6BeCxNNq9FdBs3yb4Tao7jrTiFxbBWt PottjzmFlksGSbXCvqzvbMCsigEkg0sYgndEyEBOIi7GaYXw7s+lXpF6a8vryaKj Vn40Yio7ZW8hVtQYFlsvsm4jiCygN4y+J/Icfhl3MohfOx2pfXXA7BTIGUByvWWB 83v9iPk9KejDGsZEKV5PMrTMn5fZjAMwxz2ljrD+FDMOT9RUWDFRVXgnZfm+DNL9 jo1VUb0IoesyvFH0eBt4ji1tBuHvg6J5gUukIa0wB7aDhfLHQjbxzZX/vHdCx8rE HIHPWfsGStLgzhJ411DvLOnUrtTFHxm1hBJT/M9K4fcYWHOtds+mpiLvfbh/hm6P /IEcE67ocs17zYmWhri6GXZaWMjq1Npe4gk1zNQ0jBSzTMjzdx8r6WyH13lLiPcI db9xGzGtavGYV0W2py61z+Ho23Ms4IMvnXvbuAa0I7IijE4yzPJOloLGA/bznCRU beEm6vFv6JficZU1yqC72ZC8qyd5MVlwROHAz85xrCZvZvCNET3WXi0Z4c1wa46e YAIdF8ufgOwvAdQYHaw= Extension name: 34f69 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F6A946E7E4664445

http://decryptor.top/F6A946E7E4664445

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7419fb7e3354a8d3fed0213d888312ae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7419fb7e3354a8d3fed0213d888312ae_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
        PID:4748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\34f69-readme.txt

      Filesize

      6KB

      MD5

      f52d0a85294372b992407fadf1aa1e23

      SHA1

      bc7c5d23aad009346886c33bcd64bf5e86b85466

      SHA256

      4e2f06cf75ce079aa2f9f517eec6bd3042eedcae026fffa601563f86df895697

      SHA512

      dfc9b24b8274a1fa5a62f33a9b057d3daccf6aba5c3e1997fb9e1fdd60a7610704caf50cc29ab726b13006186f2a973a0e16ed984eba1bb07c81f78d5811cad9