Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 00:20
Behavioral task
behavioral1
Sample
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
-
Size
164KB
-
MD5
ac3317e314bcdfba26c875d00e3bee70
-
SHA1
46679779e7de6cbc72b8c58cc64065edd191f226
-
SHA256
db583e09ea90ded0a3c534b0c71000fd2db204ddb6ade2431faa6c2e5adc4343
-
SHA512
f3f241370c733cbaf9667d1dc00a8480c8fe67a49118fef757a9bcb4602654db53efa454f03a2108fd49a60cd1be0ff902d535fd6132edc0f061ff42d39f2f97
-
SSDEEP
3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfUhdT9sT4JtL8B:FWe29/GuzjmfCHWtUhO4/LO
Malware Config
Extracted
C:\Users\914tn4n40-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/48F9C7B955B3B5D8
http://decryptor.top/48F9C7B955B3B5D8
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\V: rundll32.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\program files\914tn4n40-readme.txt rundll32.exe File opened for modification \??\c:\program files\WriteCompress.rle rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\914tn4n40-readme.txt rundll32.exe File opened for modification \??\c:\program files\DisconnectLimit.css rundll32.exe File opened for modification \??\c:\program files\HideRedo.xps rundll32.exe File opened for modification \??\c:\program files\SwitchReset.nfo rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\914tn4n40-readme.txt rundll32.exe File created \??\c:\program files (x86)\914tn4n40-readme.txt rundll32.exe File opened for modification \??\c:\program files\SplitInitialize.wmv rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\914tn4n40-readme.txt rundll32.exe File opened for modification \??\c:\program files\ApproveWait.html rundll32.exe File opened for modification \??\c:\program files\AssertStart.mpeg3 rundll32.exe File opened for modification \??\c:\program files\ConvertToProtect.reg rundll32.exe File opened for modification \??\c:\program files\GrantConvertFrom.TTS rundll32.exe File opened for modification \??\c:\program files\SplitExpand.wm rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1744 rundll32.exe 1884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1884 powershell.exe Token: SeBackupPrivilege 2800 vssvc.exe Token: SeRestorePrivilege 2800 vssvc.exe Token: SeAuditPrivilege 2800 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 2300 wrote to memory of 1744 2300 rundll32.exe 28 PID 1744 wrote to memory of 1884 1744 rundll32.exe 29 PID 1744 wrote to memory of 1884 1744 rundll32.exe 29 PID 1744 wrote to memory of 1884 1744 rundll32.exe 29 PID 1744 wrote to memory of 1884 1744 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2340
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD594c5046958644f24ac909c5a3a98dd25
SHA15043b85b4d465ca1c14b0807572bbbe17fc279ad
SHA2564a92acd053cd8e724b54fe35bbb34e01ba036118adc42441be505d1724bd8aa8
SHA5121e23d093fd4a5304f29a63a7f3016e05c0da37e207cda4b61adfcc42ce96b0f1ebc7ddd4454235b7a3a61c163e5e46bff5cb02f1b71ebd23c8ffc5734b084e5a