Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 15:34

General

  • Target

    b441362b424e8370b25607641aaee053_JaffaCakes118.exe

  • Size

    290KB

  • MD5

    b441362b424e8370b25607641aaee053

  • SHA1

    aee5638fcf95b8994863dc265d728a3af995a2ee

  • SHA256

    fa96876c45a2db66ae1265951e104b5c015c983724feb6ce3e0b92618f49bed4

  • SHA512

    0e19e057853cbdc60884de04b9ccf9e042d5354da1dccbf5ac45a19064582ce6407d0c9788612a209a44c11495b0774da2ce0cd23e65b5af5b5e1c0301a969fd

  • SSDEEP

    3072:yCc99moUMXv84IHesgkSx+oN/7KzTKDyOX6wKamrJPlM8dj09br:yCc9wHRtg9xkNq6wK7dq40

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$D/hOr8pZfTXyeVodyREcseBOlXf2dcLmqmQJTa4y2uSfGkhEZXq62

Campaign

4430

Decoy

ravensnesthomegoods.com

lionware.de

nhadatcanho247.com

senson.fi

walkingdeadnj.com

smessier.com

crosspointefellowship.church

extraordinaryoutdoors.com

kisplanning.com.au

4youbeautysalon.com

abogadosadomicilio.es

toponlinecasinosuk.co.uk

crowd-patch.co.uk

teresianmedia.org

kariokids.com

autodemontagenijmegen.nl

321play.com.hk

ceid.info.tr

bowengroup.com.au

antenanavi.com

Attributes
  • net

    false

  • pid

    $2a$10$D/hOr8pZfTXyeVodyREcseBOlXf2dcLmqmQJTa4y2uSfGkhEZXq62

  • prc

    vxmon

    mspub

    wordpad

    beserver

    vsnapvss

    sqbcoreservice

    ocautoupds

    dbsnmp

    CagService

    mydesktopservice

    benetns

    infopath

    tbirdconfig

    DellSystemDetect

    thebat

    isqlplussvc

    ocssd

    mydesktopqos

    steam

    bengien

    raw_agent_svc

    winword

    sql

    onenote

    firefox

    VeeamNFSSvc

    encsvc

    powerpnt

    EnterpriseClient

    outlook

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4430

  • svc

    ARSM

    vss

    MSExchange

    veeam

    VSNAPVSS

    BackupExecJobEngine

    MVarmor64

    svc$

    PDVFSService

    VeeamNFSSvc

    AcronisAgent

    sql

    CASAD2DWebSvc

    BackupExecAgentAccelerator

    AcrSch2Svc

    MSSQL

    backup

    BackupExecRPCService

    VeeamTransportSvc

    MSSQL$

    BackupExecDiveciMediaService

    MSExchange$

    MVArmor

    BackupExecVSSProvider

    sophos

    BackupExecAgentBrowser

    CAARCUpdateSvc

    VeeamDeploymentService

    mepocs

    WSBExchange

Extracted

Path

C:\Users\480xk-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 480xk. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/52C0A4AE027AABC2 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/52C0A4AE027AABC2 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: rPrCPD+EYGm8NyY56wm4QLLXOaz6yiXDzuizzNG+6haFkJooZJv99NZZnKGq0yho /XVjksmlZtIkQd+MhBTD0/zipVTwwU+qvN/xRSRnE0fSuVsbKUakDhEl1W/rkyiE wi9JSCpCZaxtVSOWM+S5SySU0qRz4tpPAw46sz4ws9Wd7mYr2hIpwVRPuYAaEL8W rCkV6kOjIbJ6PgH1v4DEfASWOrciq0LRipf09KeGjJqZUcyQ/7Fhg5aNB27UX07w sMqQOOJSxCrgzQbSi121KhRsfvJkWKUjsbWHMHhGH1kfpMvGv3e+XUrkxhZ4AJqV SZzIvWHEoQ8Vj6GDl6wF6RnHYJILws67qJy+yJNL0C36oNzAHeh9loSZYuq1lA+L 1edlSfQLDAud2/WKsSCxukjiBQ1LmvxDjfmSH24CL0hRT4BD0Yv6vpXCeWVzizTs FMIT1Qd/rxkDlZBY+QQUtqhHMxkddBZj8w8sK3VtQTUAPKCrSbGvNwLCjJ96i184 2GUDMjtJpD5SVEqL1e2i5chUYMwls24kNr5FImjVw8gEM/JJuwGYh9hBgscc2e7M zJPPZ/wBW19KGwsAN067fS8WmfgxK46kLfleVKsQSnwQ4NhO48yexHhiZJbRAIfo bbIkC8zC89VypNuyPnCt8h8G84ZfYRAEsBfZGcpAsS0rlzcwRj7tsKXs+0LQ7jLN 0OzHMn9CbcQ0bmyveZUcQCXHkOe7YuL2VYm2KsukV6hkKWypSSYC95bt4rj8xiwM A2KmQidp+2PFx9VRYV+aKHvnNCEMxEd/+0Aa6OxvCWgCPnDxSdPaKKhptHGRbLfW u5jKBKadEtA6wZGmf0Iq8oAqFUltoLK/Soar7BvqQZyh+EFeD42+l1jRH6alfvs2 9jiA0RvQ7r2xv5fWj+wUry9aNLNZ2papAFZEqZMnHX1j6C5EBbAMFu0XwPH/x0s1 29EdS5fDojVYVQXdGaZVmEDv9DxKYHREHw9t1CS+okEyE8jjnJ6ke3DOVGLhN5pa VyInMahcNvwCTRg9cw+0VpaAcVGGrs6v4atLIU7G9z333D1EnRUxuohWL62NJKHg sFUHKJDC7fO/tCTP+i+VyjYeFzGepnhhlGEebYqAeZ1Hzt8hhzYq/++Hcbtk86/8 Zuq01xJG2OyGKiCFJJSd1VUj3vXUnuPNYzqK1+vaYbaFZ8E+TqAJXipR/rDply4P ZGRpnzaaJcJCWiJwuaWfdWzdTWteLTSVQWUf42gXTdw6xP0f3QnRGr9afwfyYtCQ BXC6mPi/A0qaBL46i14YIwuwSmgGjUDs8Orf+/6bNlVUdnBIMLSOZ4MP3JYpBVKa /Z6oEC918RNGMVyIKAvuaCwB3kexF0ykCdLjBImWKWYymbwY ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/52C0A4AE027AABC2

http://decryptor.cc/52C0A4AE027AABC2

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b441362b424e8370b25607641aaee053_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b441362b424e8370b25607641aaee053_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1384
      2⤵
      • Program crash
      PID:1188
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4696
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2672 -ip 2672
      1⤵
        PID:3048

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\480xk-readme.txt

        Filesize

        6KB

        MD5

        8fa4b9573abca1903baa906c69698086

        SHA1

        7aafc96eec1f63d4eb9893f5884d85513bccb37d

        SHA256

        caf9c8bb78ca61fde71775b442bc0d1ccb2053905a8b586d259682ffa7bdeba7

        SHA512

        47f01146894382362325392c4470eb87e1eae6922fafa08ccaccf1a0bcb398a7fe9462599b71f9bda9c13b39c56fa6d0f48b65bdbab0b949ec57dc5b3c7009c2

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xr2a443k.ypn.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2448-19-0x00007FFBE60A0000-0x00007FFBE6B61000-memory.dmp

        Filesize

        10.8MB

      • memory/2448-16-0x00007FFBE60A0000-0x00007FFBE6B61000-memory.dmp

        Filesize

        10.8MB

      • memory/2448-11-0x00000298FF770000-0x00000298FF792000-memory.dmp

        Filesize

        136KB

      • memory/2448-4-0x00007FFBE60A3000-0x00007FFBE60A5000-memory.dmp

        Filesize

        8KB

      • memory/2448-15-0x00007FFBE60A0000-0x00007FFBE6B61000-memory.dmp

        Filesize

        10.8MB

      • memory/2672-3-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2672-1-0x00000000005F0000-0x00000000006F0000-memory.dmp

        Filesize

        1024KB

      • memory/2672-2-0x00000000001C0000-0x00000000001DE000-memory.dmp

        Filesize

        120KB

      • memory/2672-143-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/2672-467-0x00000000005F0000-0x00000000006F0000-memory.dmp

        Filesize

        1024KB

      • memory/2672-468-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2672-469-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/2672-473-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/2672-474-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB