Resubmissions
06-08-2024 12:58
240806-p7wxwazcqq 1003-08-2024 17:38
240803-v77x2azfqn 1030-07-2024 18:36
240730-w9akzssfmk 1028-07-2024 20:03
240728-ysq8hs1hkq 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
-
Size
116KB
-
MD5
20ed7ed36e052a523030ae979e872793
-
SHA1
b686ea3f47c254082c584ee9d18d386af4e0c870
-
SHA256
bec5d4b9979a2094fe1062512ea2754b9ce573b879b25167fa8a4f52f350edc9
-
SHA512
7df169ae3bf9bf85205a7b5a4d5ed33aed897073dc003a7ef1eea529473fffe005b549bd72e9f098ed958c8a5232640dc12928413d0690a3b6692ffd0b32cb94
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7APtwdRW4M/5qAO:8vnuGqfGOqVBP+dlt
Malware Config
Extracted
C:\Users\5zwo8p1nus-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/714473A0B6E6E49A
http://decryptor.cc/714473A0B6E6E49A
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\B: rundll32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\BlockWrite.wma rundll32.exe File opened for modification \??\c:\program files\InstallNew.csv rundll32.exe File opened for modification \??\c:\program files\WaitSend.mpe rundll32.exe File opened for modification \??\c:\program files\AddSkip.wvx rundll32.exe File opened for modification \??\c:\program files\ApproveSubmit.pptx rundll32.exe File opened for modification \??\c:\program files\InstallSend.dwfx rundll32.exe File opened for modification \??\c:\program files\RevokeInitialize.pot rundll32.exe File opened for modification \??\c:\program files\WatchRestart.ppt rundll32.exe File opened for modification \??\c:\program files\UseConvertTo.odp rundll32.exe File created \??\c:\program files (x86)\5zwo8p1nus-readme.txt rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\5zwo8p1nus-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertFromMount.DVR rundll32.exe File opened for modification \??\c:\program files\ProtectGrant.odt rundll32.exe File opened for modification \??\c:\program files\ResumeWrite.aif rundll32.exe File opened for modification \??\c:\program files\SendSwitch.vstm rundll32.exe File created \??\c:\program files\5zwo8p1nus-readme.txt rundll32.exe File opened for modification \??\c:\program files\ClearBlock.mpeg rundll32.exe File opened for modification \??\c:\program files\SelectLimit.pps rundll32.exe File opened for modification \??\c:\program files\StepRepair.m3u rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\5zwo8p1nus-readme.txt rundll32.exe File opened for modification \??\c:\program files\GrantTest.ini rundll32.exe File opened for modification \??\c:\program files\TestAdd.wmx rundll32.exe File opened for modification \??\c:\program files\CompleteRevoke.dib rundll32.exe File opened for modification \??\c:\program files\ExportClose.7z rundll32.exe File opened for modification \??\c:\program files\GrantInitialize.xps rundll32.exe File opened for modification \??\c:\program files\TraceUnpublish.mpv2 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2540 rundll32.exe Token: SeTakeOwnershipPrivilege 2540 rundll32.exe Token: SeBackupPrivilege 1144 vssvc.exe Token: SeRestorePrivilege 1144 vssvc.exe Token: SeAuditPrivilege 1144 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 PID 2516 wrote to memory of 2540 2516 rundll32.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1492
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD59e65036542b8750552102cb2d784688a
SHA1586d14161871b9c2537e643c649b36f99782e112
SHA2568a1d8d78ca70c69b24b39e03d3a496bcfd6a507f7b487c020414dc34f0d5ab21
SHA51262b834b63ae59d1f8ac0c22db2ae060e30d611602d15bb875bfe79c338c6130961b6393452cb4c5f87893f8f2769e37eb59d595b1770fad9954cadc0833ca6b8