Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 17:10

General

  • Target

    aad705e43f95a736d120d1a8cda30519_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    aad705e43f95a736d120d1a8cda30519

  • SHA1

    be7106e9066e12276d0e1c3504eb5d46a6edb296

  • SHA256

    a801a78613cbf86186b524c19f7631a5e4571e94a63df867635602624643d362

  • SHA512

    455ce98a3e3c5c4be3a1c5fc0239467e0447049e218eb3175814246cedc042bebf4bf66bd90393f544d22e75975fadca17bceb7985af7c7591a8936be1c713f4

  • SSDEEP

    1536:bs2B7p26CaItF5gNHhKWluLpWmRHICS4AH3o/qTneyW7ZZOBml2uBbKbxoVgAy6o:9fg0NBlu9CNTed7/kBazzFbULA90kY8

Malware Config

Extracted

Path

C:\5maxx-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 5maxx. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C34287B7D7533DE9 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/C34287B7D7533DE9 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: RS59kILB3WC87JmJQX6u6z9p+XNxZHK2eMMHvAkoaxQg94o9ukLntwN+pnHOmcA2 pjO12cjVk/SDLmxJ7UbBuLnlrbgziSwOPfhmEZMtiQeNo/UvktainKbDqNOgvG8b aZXnuuTQJXKGgnMnM48dfERoW0I9vk3pXiNo8gP646Zkfog/iHSpS716xFBlrEVh 1T69+030OmsWb2BALU17bMHTpaE9GuaDhcW4SOHxi+Ua+NWKuvGd4UD0/3782Jjg Kav0HgHJ+7sJr5ibvYzkYAzyO8KuvkRyLwrdYSNzSjMj4avrNot34caLtENshuor kiT7jIdFW4fZM/K5gQWYbXpv6AdJ5KpvZLtR5tayYPHZ4RHt1OrkAW9EiWLH4Unl ZH+Bk4XRyLfqCOwK2QaaydFMsBxgA430GVq8co9z3j6Fu7uTo4MuFuUjQl0bLQkc 9xHIzdkX9XZFSRcHTGv/o/s1BRhcGZKSnjEy0mNSOCwX15VMRzLF7mLEjt2FXF07 LvKiYe39/f/4sn5yJklrGjJplQNNtEACLZSlIUnq5BmG7+94p1G2d6zRfqfDvpe6 /XOUR9CE4JyNNEfOGKOaYwaWwzqMCNgprB8362jIvWFXX1My2NiZXjGzexuKr8Er rg16kP2G8l5Gb3btwJr0jUVVUC7bN8j59zB+yw/tUq3EBCaZx5Mk5cnYesoMJqkk Lbmnoc1bIfulZNwSHC63o2fBZy63JqWFBA6leHhw1tHTiDxZbLlchx/GiZwSpeIR F7dEkd/cZfC9xeSW2ssBo67rA7k3ipFzMuNOmdYX0bpxZDUQYJpcu+I3NLEdJ1H3 QUc67XIh1PrQrGlaJays5j6ftAnu4b/QV2OgxAQr/pardVLPdwqQIRPOpqPkukkV eNc9j2uc5p3Ydv5qp89mEUuF7SEucPEzbUrPhfNElq4op6CMl/M0AjRU3hn9eKPD 4U9uueBddouAgcJ9Pnmhj/EPgVx70YUb+u6/p8LIgah/L41fTMiGBOAd1zhRi+eZ bvpV23jfdCR0WlYrJdHFtw8cGW1BXYOSnyPuVc5EBZoYvkOwNf7lQIt04DpQ8wsb 2boaqMjRYJSeafRdP0VuqPTrXm3BFIjKvZfSMZkTxfDu09Ep64YOmBrozMM3Uv4t bqMbtvkQAMQKNCV5ZHxRRG+KlBcH7Pxzh1NNx5EbnyoXZ8uOUFA1PtmmQg0H7NB3 RPR0fQaD Extension name: 5maxx ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C34287B7D7533DE9

http://decryptor.top/C34287B7D7533DE9

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad705e43f95a736d120d1a8cda30519_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aad705e43f95a736d120d1a8cda30519_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1180
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2740
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\5maxx-readme.txt

      Filesize

      6KB

      MD5

      0f231a910624cc52593555be03473df7

      SHA1

      830fbb8eb2875faa6ccc1cab389d3045402876fc

      SHA256

      0d6f29d96e16f64f701c3d02ba9af5df447851fdde14a918aaf792b98a7bffbb

      SHA512

      cc99ef2f0f86dfe144c5b69c5303ea8d0b117cacb0e72e648c08c0c3d26482bca3aa488aa21bdb22014b60600cf6184aacd8a9a48a9482a27559349a4019706e

    • memory/2356-4-0x0000000002210000-0x000000000233D000-memory.dmp

      Filesize

      1.2MB

    • memory/2356-10-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2356-3-0x0000000002170000-0x000000000220F000-memory.dmp

      Filesize

      636KB

    • memory/2356-5-0x0000000000820000-0x000000000083F000-memory.dmp

      Filesize

      124KB

    • memory/2356-6-0x0000000002670000-0x0000000002779000-memory.dmp

      Filesize

      1.0MB

    • memory/2356-1-0x00000000000E0000-0x00000000000EA000-memory.dmp

      Filesize

      40KB

    • memory/2356-11-0x00000000003D0000-0x00000000003D6000-memory.dmp

      Filesize

      24KB

    • memory/2356-2-0x0000000000C60000-0x0000000000D29000-memory.dmp

      Filesize

      804KB

    • memory/2356-9-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2356-8-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2356-7-0x00000000003D0000-0x00000000003D6000-memory.dmp

      Filesize

      24KB

    • memory/2356-12-0x00000000003D0000-0x00000000003D6000-memory.dmp

      Filesize

      24KB

    • memory/2356-14-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2356-0-0x00000000000E0000-0x00000000000EA000-memory.dmp

      Filesize

      40KB