Resubmissions
07-08-2024 18:16
240807-wwjlqs1hjm 1007-08-2024 18:14
240807-wvf48a1grn 1028-05-2024 08:02
240528-jxc45abh5s 10Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
-
Size
166KB
-
MD5
7c421ca94c441a4b74d364f952f8739c
-
SHA1
e5de78ae8db1aa78e00c1fa1eb5687cd1519843c
-
SHA256
7afc7a311740da58cb0b7d6c43e28b1ddb6fce9c67614e74902e552b330287b0
-
SHA512
0eb45486ab306562c267eba5eae7f1b8d6d551b83603d136865c2e1c7c90abb0067effc4a358649846dc89ef37ad9ff266922223f318a631d3f457792f1df4d2
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QDhqtUczTajkz+XHUU:NJ0BXScFyfC3Hd4ygV6oPHU
Malware Config
Extracted
C:\Users\850k23e-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E1C97B2D065B3717
http://decryptor.cc/E1C97B2D065B3717
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\F: rundll32.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification \??\c:\program files\MoveResolve.3gp rundll32.exe File opened for modification \??\c:\program files\UninstallPush.dib rundll32.exe File opened for modification \??\c:\program files\WaitClose.ttf rundll32.exe File opened for modification \??\c:\program files\ClosePop.pdf rundll32.exe File opened for modification \??\c:\program files\ExitUndo.asf rundll32.exe File opened for modification \??\c:\program files\HideExpand.ini rundll32.exe File opened for modification \??\c:\program files\RegisterDebug.xlt rundll32.exe File opened for modification \??\c:\program files\SwitchJoin.jpg rundll32.exe File created \??\c:\program files (x86)\850k23e-readme.txt rundll32.exe File opened for modification \??\c:\program files\ApproveFind.ppsx rundll32.exe File opened for modification \??\c:\program files\AssertMove.ods rundll32.exe File created \??\c:\program files\850k23e-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointResize.tmp rundll32.exe File opened for modification \??\c:\program files\DenyBlock.TS rundll32.exe File opened for modification \??\c:\program files\EnableUndo.txt rundll32.exe File opened for modification \??\c:\program files\RepairMeasure.mp3 rundll32.exe File opened for modification \??\c:\program files\ResolveWatch.m1v rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1124 rundll32.exe 1124 rundll32.exe 1900 powershell.exe 1900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1124 rundll32.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeBackupPrivilege 4536 vssvc.exe Token: SeRestorePrivilege 4536 vssvc.exe Token: SeAuditPrivilege 4536 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1124 4564 rundll32.exe 83 PID 4564 wrote to memory of 1124 4564 rundll32.exe 83 PID 4564 wrote to memory of 1124 4564 rundll32.exe 83 PID 1124 wrote to memory of 1900 1124 rundll32.exe 91 PID 1124 wrote to memory of 1900 1124 rundll32.exe 91 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:412
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57eddc5fe30e6dad332daa74a3a2e60a6
SHA1579568f2fc33a24d240e77406ed31f0e46f06394
SHA256be4b39a704afcf40ddd154510aa87b357f40191b9ff6992b17dc2a608c39eff1
SHA5121459bf69561f34b9ecebfca73aeede8a6075f9e33a05172a7ffc988d74cc49f89499c39b38c96d655fc45fefdc02fb8210751966894f33adffed60df01037868
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82