Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 00:20
Behavioral task
behavioral1
Sample
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll
-
Size
164KB
-
MD5
ac3317e314bcdfba26c875d00e3bee70
-
SHA1
46679779e7de6cbc72b8c58cc64065edd191f226
-
SHA256
db583e09ea90ded0a3c534b0c71000fd2db204ddb6ade2431faa6c2e5adc4343
-
SHA512
f3f241370c733cbaf9667d1dc00a8480c8fe67a49118fef757a9bcb4602654db53efa454f03a2108fd49a60cd1be0ff902d535fd6132edc0f061ff42d39f2f97
-
SSDEEP
3072:FWeI5JXJRGpUhFiWjmfb+HP+rnRfUhdT9sT4JtL8B:FWe29/GuzjmfCHWtUhO4/LO
Malware Config
Extracted
C:\Users\003o5in6-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/37F30DC96C41006E
http://decryptor.top/37F30DC96C41006E
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\S: rundll32.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification \??\c:\program files\AddInitialize.svg rundll32.exe File opened for modification \??\c:\program files\EnableWatch.raw rundll32.exe File opened for modification \??\c:\program files\DenySelect.xht rundll32.exe File opened for modification \??\c:\program files\InitializeUnlock.wmf rundll32.exe File opened for modification \??\c:\program files\RenameStop.clr rundll32.exe File opened for modification \??\c:\program files\ApproveUnlock.xlsb rundll32.exe File opened for modification \??\c:\program files\EnterSwitch.dxf rundll32.exe File opened for modification \??\c:\program files\ExitUnlock.vsx rundll32.exe File opened for modification \??\c:\program files\MoveConvertFrom.pdf rundll32.exe File opened for modification \??\c:\program files\ResolveGet.3g2 rundll32.exe File opened for modification \??\c:\program files\ReceiveSearch.vdx rundll32.exe File opened for modification \??\c:\program files\RemoveStart.ini rundll32.exe File opened for modification \??\c:\program files\WaitNew.mpeg rundll32.exe File opened for modification \??\c:\program files\RenameCompare.mht rundll32.exe File opened for modification \??\c:\program files\UseDismount.docx rundll32.exe File created \??\c:\program files\003o5in6-readme.txt rundll32.exe File created \??\c:\program files (x86)\003o5in6-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConnectDebug.pps rundll32.exe File opened for modification \??\c:\program files\GrantEnable.M2T rundll32.exe File opened for modification \??\c:\program files\RedoGrant.xlsb rundll32.exe File opened for modification \??\c:\program files\ExpandUpdate.bmp rundll32.exe File opened for modification \??\c:\program files\ExpandWatch.eprtx rundll32.exe File opened for modification \??\c:\program files\ResolveAssert.potm rundll32.exe File opened for modification \??\c:\program files\StepWait.gif rundll32.exe File opened for modification \??\c:\program files\AddMove.emf rundll32.exe File opened for modification \??\c:\program files\GroupSelect.nfo rundll32.exe File opened for modification \??\c:\program files\CheckpointSelect.DVR-MS rundll32.exe File opened for modification \??\c:\program files\EnableReset.ogg rundll32.exe File opened for modification \??\c:\program files\InvokeSend.doc rundll32.exe File opened for modification \??\c:\program files\ReadDisable.crw rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1328 rundll32.exe 1328 rundll32.exe 2152 powershell.exe 2152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2152 powershell.exe Token: SeBackupPrivilege 544 vssvc.exe Token: SeRestorePrivilege 544 vssvc.exe Token: SeAuditPrivilege 544 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1328 4440 rundll32.exe 81 PID 4440 wrote to memory of 1328 4440 rundll32.exe 81 PID 4440 wrote to memory of 1328 4440 rundll32.exe 81 PID 1328 wrote to memory of 2152 1328 rundll32.exe 86 PID 1328 wrote to memory of 2152 1328 rundll32.exe 86 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac3317e314bcdfba26c875d00e3bee70_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4972
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD585f0400c815c55e85ed4343605dd4e40
SHA117b1444f0efab089ab151ecaccd2a32a03c1236a
SHA2569be975b7cc454dc76daa3f68acbf77fb938d34011a14d70d25273caf274a69ec
SHA5128a1b06fd162f870d591dc4ab71203167d0ae57e967827ad04995785b416a28c6404ee8a7626029aaf8dede6f3aee9dbd5294b66c8e11ee9ce3d08486dec8d0b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82