Resubmissions

06-08-2024 12:58

240806-p7wxwazcqq 10

03-08-2024 17:38

240803-v77x2azfqn 10

30-07-2024 18:36

240730-w9akzssfmk 10

28-07-2024 20:03

240728-ysq8hs1hkq 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2024 18:36

General

  • Target

    20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    20ed7ed36e052a523030ae979e872793

  • SHA1

    b686ea3f47c254082c584ee9d18d386af4e0c870

  • SHA256

    bec5d4b9979a2094fe1062512ea2754b9ce573b879b25167fa8a4f52f350edc9

  • SHA512

    7df169ae3bf9bf85205a7b5a4d5ed33aed897073dc003a7ef1eea529473fffe005b549bd72e9f098ed958c8a5232640dc12928413d0690a3b6692ffd0b32cb94

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7APtwdRW4M/5qAO:8vnuGqfGOqVBP+dlt

Malware Config

Extracted

Path

C:\Users\5zwo8p1nus-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 5zwo8p1nus. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/714473A0B6E6E49A 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/714473A0B6E6E49A Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: GgmqYlbMvLeE8Z/7YRktehvpLaIpfhdN0eIWAcA1ZXnMFQ4JU9RSPHNLy7e9/ys7 kZMAAaCaNnLcuZc37wjy/thFUCNT20Sc0f76cEQNkjFXOQZZe3Wm+QgzrX/Zvv53 RCZVONw7zzn6AqsQePdpWpQNr4qIeva3tnXeUFay2Qd0gGgOOGA874WwDpQvWxDw ciTXBfZ7KPaSevv66dd4Qf1Q3+yTTAvdc2sZqRkedTRZDP2vQ9sh7PfBzbd1mZDR URLuI7a76RtUVrl9nAqtuATUakKJFUgEH405eXJrVX5U+ncFGJtTt9qZnLADuLVp axPdVK5yTY555aQ/shjmlsCTGDbdxnuNr5eKWnzBgS9p1qy63UCJ8nlvJdkd+Kjo n1pqQDnYlD0Nhn7x5apyVkhw22LpypVh/guY+hi8MIb31awpt1eKIU+vcjDAknvf fjOtNA+g3jm45hMJG5U9S996K48w5IFYC+czHeCfvMg0+sQuikmGFnQKxQAyjpJD 43ZkQikiIczQvO+zxdGFCxoMlJT8uLWFyqydZPRSm3fwyfX1fGw+zWq5cqd6j9AA xIZv8+evCwfgHRJvFcHz7CH/SwJyURm5z6IIYPF6z+THBdLy4FJZmowSHKfYHqBI QjzEvGtSZw3n78UXguMW4bD4VUG2VjyknG6xBEKhVKMVTPd/jRzWRSdmo6hWplXs Sdf8ulbZoMSpaRznJIG3xaIV0mNXMrAbgcgpJZn5A5NOQy5ZU7e37PzfAVzee1fx Wd9GWHAPew2i528OrttreJynygtq/izcd8nltYXkB39A7JoNoHiex5ZeXqpi/prN hvwmMjl1s06XKgX/0124PlXWkvvw6fqpfkQXjBCy1D4JO+yVsI/A3BX+lOpoRA8Y 4nw4utzJq7dvEtbmDVqKM5KSiziaCPXEs0qKYofKdwEDAAC52oYBjbq2NOjxVc+3 5WoUH5l2AF3cWG0T9ZEF2iGE8BA1HEwLPx0Kw6NWCkF2FSRkqDZszZ4hUKQcJT6l 4j/6+KobI3aU4WVBP9nB2LRLPrvqoaqFhiY75hVceNA2CXm0afkdR1THav5fDYBr RQ6024w+gD5ayDw52rr/cJmQe/JxI9dYkuuFV5SdjRTOMyCEpNCn7lTUAP6e1e9V YBQFV43xqen5XnlYUe+QgcRKcxRgoMjr1E7X127XeJln7gMF3U16ATcQVsvjdPHo IPOoVjOvSIP8R4rLGTxe9/4z2PlAr/lqoL7nI4FyUK9QkOp/5ZHWYND0x80VY8Dk tKge1VWFiE3u7y1ISUw6Dwywniu1TeWwXxXrzLukN5JsJwkFhkQQObZe31f9Nf7L TAH+L3u9Jl+IGxUmKiXVwPv5iWsnyjHij3JvikG9tYDGA3qiJ2rCTw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/714473A0B6E6E49A

http://decryptor.cc/714473A0B6E6E49A

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1492
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\5zwo8p1nus-readme.txt

      Filesize

      6KB

      MD5

      9e65036542b8750552102cb2d784688a

      SHA1

      586d14161871b9c2537e643c649b36f99782e112

      SHA256

      8a1d8d78ca70c69b24b39e03d3a496bcfd6a507f7b487c020414dc34f0d5ab21

      SHA512

      62b834b63ae59d1f8ac0c22db2ae060e30d611602d15bb875bfe79c338c6130961b6393452cb4c5f87893f8f2769e37eb59d595b1770fad9954cadc0833ca6b8