Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
906476f7f37236ab87319d477afec56f_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
906476f7f37236ab87319d477afec56f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
906476f7f37236ab87319d477afec56f_JaffaCakes118.dll
-
Size
116KB
-
MD5
906476f7f37236ab87319d477afec56f
-
SHA1
16485c511e413cc33b4fe6ef3c95b65198cdd9f3
-
SHA256
b8dc282b15526821326ae7158f5e4e895a874fc15499d102d59e819aa78d5800
-
SHA512
8c893d42f90a4d63b6261c8644bb97807052fa1570693b3cc179566b7a14f28590d7d2e4e5062cbb731617f83c46c0333d46a45a5ad2138576b95867fbf323ce
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7A2Ow/TGXiPt50c0HL:8vnuGqfGOqVB2bSXiVW5
Malware Config
Extracted
C:\Users\70hl7eptdz-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/33DC82BDF20AD8A9
http://decryptor.cc/33DC82BDF20AD8A9
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\E: rundll32.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification \??\c:\program files\UnregisterBackup.clr rundll32.exe File created \??\c:\program files\70hl7eptdz-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointRedo.xlt rundll32.exe File opened for modification \??\c:\program files\TraceJoin.mhtml rundll32.exe File opened for modification \??\c:\program files\EditComplete.vsdm rundll32.exe File opened for modification \??\c:\program files\BackupFind.jpg rundll32.exe File opened for modification \??\c:\program files\ClearMove.aif rundll32.exe File opened for modification \??\c:\program files\DebugPublish.snd rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\70hl7eptdz-readme.txt rundll32.exe File created \??\c:\program files (x86)\70hl7eptdz-readme.txt rundll32.exe File opened for modification \??\c:\program files\PushInitialize.vsd rundll32.exe File opened for modification \??\c:\program files\RepairUnblock.DVR rundll32.exe File opened for modification \??\c:\program files\OutRead.nfo rundll32.exe File opened for modification \??\c:\program files\RestoreWatch.dotm rundll32.exe File opened for modification \??\c:\program files\SaveReceive.jtx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\70hl7eptdz-readme.txt rundll32.exe File opened for modification \??\c:\program files\AddStep.AAC rundll32.exe File opened for modification \??\c:\program files\EditReceive.aifc rundll32.exe File opened for modification \??\c:\program files\HideJoin.xltm rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1460 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1460 rundll32.exe Token: SeTakeOwnershipPrivilege 1460 rundll32.exe Token: SeBackupPrivilege 1996 vssvc.exe Token: SeRestorePrivilege 1996 vssvc.exe Token: SeAuditPrivilege 1996 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 PID 2100 wrote to memory of 1460 2100 rundll32.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906476f7f37236ab87319d477afec56f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\906476f7f37236ab87319d477afec56f_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2624
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD503b5243951bfd05f410e17a71db67387
SHA12ff7896fa98a22235b5faa6ee9ee8aeab7d7a0dc
SHA256f8a6ef4114931942b12e57c87b8eef531b57393bdaf7c83df085a2efa12499a4
SHA5128e6213dd8c142fbda5b0e361e4f5d07d66a771105e861d000a0e5e5d040e225cfa677d5421bb313bdbb369467c3d52a3f355a8f805c885d064e04438bf959746