Resubmissions

15-06-2024 03:27

240615-d1akhs1fmk 10

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2024 03:27

General

  • Target

    acbd7cf1df4ef4e2c4812747cd443e66_JaffaCakes118.dll

  • Size

    166KB

  • MD5

    acbd7cf1df4ef4e2c4812747cd443e66

  • SHA1

    9e386231a88ffafb3597fddfa909289febf105df

  • SHA256

    218ad6e33041a0bdb60c8de03e7dcdf42e5392e106a4b5b0436cdaa02a8dd2c9

  • SHA512

    8f116add8d2108ad314221bb4fb77308884c849d8f614f140ca7d989e481b4024afa37a768d20257296c0a6715ca8bb1341081eb896a6045617ea4e403b676f5

  • SSDEEP

    3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3Q3VMg7UEgZp6:NJ0BXScFyfC3Hd4yg3V5K

Score
10/10

Malware Config

Extracted

Path

C:\Users\6vjnp19j69-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 6vjnp19j69. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C6C8BAF20F4F67F8 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C6C8BAF20F4F67F8 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: EA/jLuCfdaRVAyFdrz5uINREMM7NIGnnhooKfSb8YmASE8sax5pqLHkNQlP+GCkw 5MiPnBNRbfN075DyX8Ilb5D77LHF0CGjvdoX6jH5Um7b56UjS9kCQszS+sZ3dd6J FAtwB4yy84yuny1plEqvk4syqSyHAmIP2xmm0Kwi2hXgPeXB/4e/4iZzpstGyXEm zPMa4tKyHwFiVg5RG3EDU6jN151gcCfXkjhUW5LmolTNAcQR3WXU2xoUnVcTRxin FDqxMekCD+J0s3DPUvUnKNd00XJ+lBTRxLISefyVvxGskXH61EQvGjh4P+Mqjkw+ VsWZ/dKpyAcRgREycyQ/PZPcotffb74y0v2cSsltmgt10xsZyICw0K3iIB4Y4Fby yVl5mhqUXdqokgakBmmUy24ua6So8PaGBC261nbHNeqzmZRSCJrrYDKZN6jrjbAZ mxRT1pdUhmWf4pzHbOE9l0VTy/JGFU4VpSheSi+G/5JqIypOFiY3f+1yRGNXpjD2 OSsa7XVehzRjWM4CS7InKcNyID6beqc6myiiTZfaxUa22AzXepuGzCieszMJ01nI /Qsp4lTj1lKmiyQq3WM71SnZZmjV/K81iXBvcig4P4zA0999H2fZtPEopyfUqj7W QniSvEda26+yMfLp8abOjl9CZ1jXOQmaE1/IZ0aecjzQfOwLBIeQcL1TdhLeTXQj ESDcmeHjDdoJopssKq5X3lJPvK+C3d96lM0msAtc/Ng6Cc2Sx8FzOMpPfqER+oFA tYw21RXgbzEaI3KqBDZLZe1N38iRIvyPP/4SJQKXIBKEFkS9DVYMD28f8VGZWPnM jk5Wbzoll8S+EwStcAa5EY4icJcXWL1PBlGPcpfAs3QhxOxl5j60or/nAuILAwKt XsEEahrTI/odDDxY5pP9PnicYAFMGQuIFdPAQAkkgbnipawSSslmrYsVUUu20cR7 gRpGprJd86KpOW2NQb+cyT+Cqg8f9rxCDTUrq9Hm+P7MiN68zxSsEK739EhfVU/H OvVxK8glapARWy+lhFIRWTfHUL9ZeT7n3qTlhrea2JeGmGaqWFGg2nA2WtxwRUd6 91uoVWQD870PdWueiemghrfJaKmhdNWWy/V/JGSGH8N75+hntsYYP+WZLS+Q562l 2jFTHQrQzQyktYocOY5Dl2C6NA8BNU2fN5oQYtAdutaUPRe/woXB0WZf852cdxD1 Mqcg7Fiitjn05zIynCFLPX01wgcLdTQP1L8I4gyQxg/W+PrTZ7mBRhm3aO9X2zhy XhB58RDxjqqgcUY5LOX1Upl28RSYvn5pqsCo7gR8FTC+G6Xw2+i0908f0hItAoCt lHWHGy8dTlAtaUHWHzD5rv7D7X9hTKCCy1AjzmOXlkW22TDqJdZS01/tY8XeXQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C6C8BAF20F4F67F8

http://decryptor.cc/C6C8BAF20F4F67F8

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\acbd7cf1df4ef4e2c4812747cd443e66_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\acbd7cf1df4ef4e2c4812747cd443e66_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3220
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5004
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4240,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:8
      1⤵
        PID:5428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\6vjnp19j69-readme.txt

        Filesize

        6KB

        MD5

        6a79ed7192bb52698ce0566d257bb8a9

        SHA1

        f08a840d1453d4cfa68d72c1bcaada6331589ed7

        SHA256

        36b7ef42d762acff310ba86756596035f786d87c4f74b1aa7ee44d3f588ac124

        SHA512

        537e52454c968448e3eff918761291e8986549c3aea437ceedf08f56903e22eec1f4b8973e6cfca14d21fda897f09fcf06d5c66a67599c0ff848c5208fd80042

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m05ayvgw.bmd.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/772-0-0x00007FFCC2063000-0x00007FFCC2065000-memory.dmp

        Filesize

        8KB

      • memory/772-6-0x000002E1E31B0000-0x000002E1E31D2000-memory.dmp

        Filesize

        136KB

      • memory/772-11-0x00007FFCC2060000-0x00007FFCC2B21000-memory.dmp

        Filesize

        10.8MB

      • memory/772-12-0x00007FFCC2060000-0x00007FFCC2B21000-memory.dmp

        Filesize

        10.8MB

      • memory/772-15-0x00007FFCC2060000-0x00007FFCC2B21000-memory.dmp

        Filesize

        10.8MB