Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 01:45
Behavioral task
behavioral1
Sample
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe
-
Size
164KB
-
MD5
b63bf2e4a6a0bc89f8375aa0f6672cea
-
SHA1
2c2ec58749b66d1814f27cbc3e8d845a3e7866fc
-
SHA256
3ea8f71bfb79e6547788eb5f2718d8cfc31fe6d99e15e6a8062406aedfcdfa90
-
SHA512
92a96ab7d0e7add812c49013ffc66a4f168becebdd68cf867c7d2655bcf6f2a0bcf1f78199b24b4741d0a832387eeb15ba9ae3c5e3fb0ddcc943e1e084145948
-
SSDEEP
3072:FHixaVZFiOCDJtOicNDWEzZthCcHR6I2qB:FHigLF5CCj5zZt7D
Malware Config
Extracted
C:\Users\5317f-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BBD560A9F7B1515
http://decryptor.top/7BBD560A9F7B1515
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exedescription ioc process File opened (read-only) \??\T: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\Z: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\K: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\L: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\M: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\N: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\O: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\P: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\A: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\G: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\Q: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\V: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\X: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\R: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\J: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\W: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\F: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\B: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\H: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\I: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\D: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\E: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\S: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\U: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened (read-only) \??\Y: b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0x8j7.bmp" b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe -
Drops file in Program Files directory 39 IoCs
Processes:
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\program files\ClearMeasure.rtf b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\CompareExport.au b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectRequest.emf b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\StopSearch.vssm b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressUse.bin b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ConfirmSearch.nfo b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\HideInstall.reg b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\MoveStop.jpeg b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\StartSwitch.jpe b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\StopOptimize.mp4v b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameTrace.jpg b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\UnlockConvertTo.fon b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File created \??\c:\program files (x86)\5317f-readme.txt b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertRegister.vssm b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\DenyComplete.htm b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveStart.pptx b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\RemoveDisable.mov b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameTrace.bmp b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishPop.mht b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\UnprotectLock.xlsx b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertStop.wps b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ConfirmCheckpoint.wm b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ExportConvertTo.docx b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\PingCompare.png b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\RepairConvertTo.php b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectCheckpoint.inf b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File created \??\c:\program files\5317f-readme.txt b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\BlockUninstall.vdx b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertTrace.mp3 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\MoveReceive.vsw b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupConvertTo.3g2 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressPop.contact b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\SwitchMeasure.mpg b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\InitializeRestore.xml b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveCheckpoint.docx b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\SyncDeny.htm b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertRename.mp3 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressRead.mpg b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameUnblock.vst b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exepowershell.exepid process 2524 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe 2524 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe 4136 powershell.exe 4136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4136 powershell.exe Token: SeBackupPrivilege 3388 vssvc.exe Token: SeRestorePrivilege 3388 vssvc.exe Token: SeAuditPrivilege 3388 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exedescription pid process target process PID 2524 wrote to memory of 4136 2524 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe powershell.exe PID 2524 wrote to memory of 4136 2524 b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe powershell.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b63bf2e4a6a0bc89f8375aa0f6672cea_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3976,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4000 /prefetch:81⤵PID:4684
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5484a37b2535f25d82c06525c19582cb1
SHA1854762832e331be6e400b0f850cab205464113ea
SHA25641d31c2274bfd24d05f0e83fe599aa3b614347a4cef63c3467f6de09a53ee00a
SHA512675f1ea6b0466d3a6b8d2d907d8039e0f3282ca434e9fb016351731596373dd3b56f05ec85bab4e0bbff3be34e30b3c3f23b3e4fb31c9890cc3644951b8bf353
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82