Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
ab8f4c4066dd0eaa61d6a1e32d0312d9_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ab8f4c4066dd0eaa61d6a1e32d0312d9_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
ab8f4c4066dd0eaa61d6a1e32d0312d9_JaffaCakes118.dll
-
Size
166KB
-
MD5
ab8f4c4066dd0eaa61d6a1e32d0312d9
-
SHA1
d649f611ede50ab27e1856e17c0555158113fab4
-
SHA256
d72293344521c9740801788c0155ce0ad33e89cda85776554a88f73aa9ae200a
-
SHA512
dd1901a904c40a81922880f2a34c622d8dc0558ecea3a6f3520d87b26172cd784a0e3953d34948a9fe6b7ff46115be6fddd086655b4e76dea536dd8fcd0f5ace
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfP0rTNIBSV:Ww9vteqJggn7oUfPku
Malware Config
Extracted
C:\Users\k8g31t-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/04A8BF3770A9366F
http://decryptor.cc/04A8BF3770A9366F
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification \??\c:\program files\SendRevoke.xhtml rundll32.exe File opened for modification \??\c:\program files\UsePublish.search-ms rundll32.exe File created \??\c:\program files\k8g31t-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompressMeasure.vstx rundll32.exe File opened for modification \??\c:\program files\ConvertFromResize.xhtml rundll32.exe File opened for modification \??\c:\program files\OptimizeConfirm.asf rundll32.exe File opened for modification \??\c:\program files\PushConvert.pptx rundll32.exe File opened for modification \??\c:\program files\SubmitWrite.aifc rundll32.exe File created \??\c:\program files (x86)\k8g31t-readme.txt rundll32.exe File opened for modification \??\c:\program files\BlockSuspend.nfo rundll32.exe File opened for modification \??\c:\program files\BlockWatch.avi rundll32.exe File opened for modification \??\c:\program files\OpenSkip.raw rundll32.exe File opened for modification \??\c:\program files\PingLimit.vsdx rundll32.exe File opened for modification \??\c:\program files\DisconnectExport.css rundll32.exe File opened for modification \??\c:\program files\FormatProtect.zip rundll32.exe File opened for modification \??\c:\program files\MoveSet.pub rundll32.exe File opened for modification \??\c:\program files\NewEnable.au rundll32.exe File opened for modification \??\c:\program files\SubmitEdit.html rundll32.exe File opened for modification \??\c:\program files\SkipProtect.M2V rundll32.exe File opened for modification \??\c:\program files\ApproveLock.pdf rundll32.exe File opened for modification \??\c:\program files\BlockStep.7z rundll32.exe File opened for modification \??\c:\program files\GroupSplit.easmx rundll32.exe File opened for modification \??\c:\program files\JoinSubmit.vsw rundll32.exe File opened for modification \??\c:\program files\ResumeExpand.mp3 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1604 rundll32.exe 1604 rundll32.exe 5064 powershell.exe 5064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1604 rundll32.exe Token: SeDebugPrivilege 5064 powershell.exe Token: SeBackupPrivilege 1916 vssvc.exe Token: SeRestorePrivilege 1916 vssvc.exe Token: SeAuditPrivilege 1916 vssvc.exe Token: SeTakeOwnershipPrivilege 1604 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1604 1224 rundll32.exe 89 PID 1224 wrote to memory of 1604 1224 rundll32.exe 89 PID 1224 wrote to memory of 1604 1224 rundll32.exe 89 PID 1604 wrote to memory of 5064 1604 rundll32.exe 93 PID 1604 wrote to memory of 5064 1604 rundll32.exe 93 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab8f4c4066dd0eaa61d6a1e32d0312d9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab8f4c4066dd0eaa61d6a1e32d0312d9_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2788
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4136,i,3671441404766730751,12082497324212183132,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD562c8ad1e9a2ec3be424f6b1343f7f252
SHA1a06a3930fc87d571eb8229168a54fa50e217e883
SHA256e23e94dd097a4884baee2bfcddc1b12e6dad9e97fee83fcaa856d74824adbd07
SHA512d8024aa412943d4dcec3ce97d4374deb95b8cbd4400b6ab3acb607e3e3ecf2d26ef4dc07be6b3445f698be39552f1c565f3f1f8f3335f57a167948e18843eec5