Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll
-
Size
114KB
-
MD5
b0d6817c4bcd8df8703a0aa8d2ba08e3
-
SHA1
29c4c5e9c180c4c1241b69dd72ebdf5234628cbc
-
SHA256
f4f27a8d8607db742cdc40a1bffe2384f2a3bdeaa4f10c86d0e339f746a00036
-
SHA512
cbe7efb0bded61d4745783e482fcb4332d238855d175f3d15775ab3f8faa25151898611d46a44c38cd1b5b374eee6b892dd1feb03021031041cb444b0e55f69b
-
SSDEEP
1536:6Q2auIslFGhFtuAp75WeNMYLoRGp+K6fHICS4Ad1vdhC9fhHNPMf:3sI/hqsMYLoRK7b1TafHW
Malware Config
Extracted
C:\Users\333k96-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2A923E9CE5B93D00
http://decryptor.cc/2A923E9CE5B93D00
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\W: rundll32.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification \??\c:\program files\CloseSuspend.vdx rundll32.exe File opened for modification \??\c:\program files\ProtectBlock.dib rundll32.exe File opened for modification \??\c:\program files\PublishDisconnect.bmp rundll32.exe File created \??\c:\program files (x86)\333k96-readme.txt rundll32.exe File opened for modification \??\c:\program files\ImportEdit.pcx rundll32.exe File opened for modification \??\c:\program files\OutInvoke.crw rundll32.exe File opened for modification \??\c:\program files\RegisterStart.php rundll32.exe File created \??\c:\program files\333k96-readme.txt rundll32.exe File opened for modification \??\c:\program files\CloseDismount.m3u rundll32.exe File opened for modification \??\c:\program files\DisableExport.3g2 rundll32.exe File opened for modification \??\c:\program files\EditFormat.vssm rundll32.exe File opened for modification \??\c:\program files\ExitLock.otf rundll32.exe File opened for modification \??\c:\program files\LimitReset.mp4 rundll32.exe File opened for modification \??\c:\program files\OptimizeDismount.clr rundll32.exe File opened for modification \??\c:\program files\SaveConnect.au rundll32.exe File opened for modification \??\c:\program files\SplitStart.ex_ rundll32.exe File opened for modification \??\c:\program files\ConvertFromDisconnect.ogg rundll32.exe File opened for modification \??\c:\program files\SaveRepair.mpg rundll32.exe File opened for modification \??\c:\program files\SetNew.xlsb rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4640 rundll32.exe 4640 rundll32.exe 2128 powershell.exe 2128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4640 rundll32.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeBackupPrivilege 2988 vssvc.exe Token: SeRestorePrivilege 2988 vssvc.exe Token: SeAuditPrivilege 2988 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4640 5012 rundll32.exe 80 PID 5012 wrote to memory of 4640 5012 rundll32.exe 80 PID 5012 wrote to memory of 4640 5012 rundll32.exe 80 PID 4640 wrote to memory of 2128 4640 rundll32.exe 81 PID 4640 wrote to memory of 2128 4640 rundll32.exe 81 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b0d6817c4bcd8df8703a0aa8d2ba08e3_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4840
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b4783b020df4a56d145743d0ff56ac66
SHA1c74f486413afb212930a30118f2b936626493985
SHA2566d1edeaee748f480db666dd8db3793e0b75b8470062a142fc8464f15a53b67ba
SHA5126b7241825641f3ce1842d053a3da2787f693fe5c48b29e6cfcd992530b0c513899f872cb4d1523cc153c21e82f4f58c7069a3b2d8da395934ca53d6e7d11a55e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82