Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
7ec9d06ed280e25df7d85d740f21558a_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7ec9d06ed280e25df7d85d740f21558a_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
7ec9d06ed280e25df7d85d740f21558a_JaffaCakes118.dll
-
Size
116KB
-
MD5
7ec9d06ed280e25df7d85d740f21558a
-
SHA1
946746d1163ce772b2a72b67db3cadabac2ff1ae
-
SHA256
1bc9040cfa3738e8a2e0409efb17726c8f4894e462f2e51d2a18664c4c799e16
-
SHA512
e16702beebe37e69b6146d49376ce29dac50cfc510ecea0690a63ec2b139c6123ce2320d7f0e6d35ba97185a19f98087a551b20e1e68bf32a05f609783aa65d0
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7A9WySHmQGm73P/njCV3e:8vnuGqfGOqVBonYmLn+V3e
Malware Config
Extracted
C:\Users\s28wn-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/543D03B565F1912E
http://decryptor.cc/543D03B565F1912E
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File created \??\c:\program files\s28wn-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupAssert.mov rundll32.exe File opened for modification \??\c:\program files\UndoMount.snd rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\s28wn-readme.txt rundll32.exe File opened for modification \??\c:\program files\FormatMeasure.potx rundll32.exe File opened for modification \??\c:\program files\JoinConnect.ttc rundll32.exe File opened for modification \??\c:\program files\MeasureRegister.mht rundll32.exe File opened for modification \??\c:\program files\UpdateAdd.vbe rundll32.exe File opened for modification \??\c:\program files\TestUse.pub rundll32.exe File opened for modification \??\c:\program files\ConvertFromDismount.easmx rundll32.exe File opened for modification \??\c:\program files\ImportHide.m4v rundll32.exe File opened for modification \??\c:\program files\OutLock.wma rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\s28wn-readme.txt rundll32.exe File opened for modification \??\c:\program files\UnregisterDisable.ttf rundll32.exe File opened for modification \??\c:\program files\RemoveExport.7z rundll32.exe File opened for modification \??\c:\program files\SetCopy.M2T rundll32.exe File opened for modification \??\c:\program files\SetSync.zip rundll32.exe File opened for modification \??\c:\program files\StopGet.pptx rundll32.exe File opened for modification \??\c:\program files\LimitRegister.wm rundll32.exe File opened for modification \??\c:\program files\UseInstall.avi rundll32.exe File opened for modification \??\c:\program files\MergeSplit.rar rundll32.exe File opened for modification \??\c:\program files\SelectRemove.odt rundll32.exe File created \??\c:\program files (x86)\s28wn-readme.txt rundll32.exe File opened for modification \??\c:\program files\ClearDebug.dotx rundll32.exe File opened for modification \??\c:\program files\SendConvert.avi rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2764 rundll32.exe Token: SeTakeOwnershipPrivilege 2764 rundll32.exe Token: SeBackupPrivilege 2732 vssvc.exe Token: SeRestorePrivilege 2732 vssvc.exe Token: SeAuditPrivilege 2732 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 PID 2748 wrote to memory of 2764 2748 rundll32.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ec9d06ed280e25df7d85d740f21558a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ec9d06ed280e25df7d85d740f21558a_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2028
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e33ad8f9a31158288cd4490c9f362c5a
SHA158f343ef57868db2dc81674d36a0deb6bb5bfe97
SHA256019bf96eba731478eddaa1886c4eeff2c030a1f905e87795d64db0ce7de26eb7
SHA5123bacc93f97d87d2e277cc86a0c304691f0acaf3e399ca3b2b7968dc012fdd1edb0d31a348519ad0fc84cd28043d0558db9393dcd581a6afd6ad9743cb04e6fba