Resubmissions
06-08-2024 12:58
240806-p7wxwazcqq 1003-08-2024 17:38
240803-v77x2azfqn 1030-07-2024 18:36
240730-w9akzssfmk 1028-07-2024 20:03
240728-ysq8hs1hkq 10Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
-
Size
116KB
-
MD5
20ed7ed36e052a523030ae979e872793
-
SHA1
b686ea3f47c254082c584ee9d18d386af4e0c870
-
SHA256
bec5d4b9979a2094fe1062512ea2754b9ce573b879b25167fa8a4f52f350edc9
-
SHA512
7df169ae3bf9bf85205a7b5a4d5ed33aed897073dc003a7ef1eea529473fffe005b549bd72e9f098ed958c8a5232640dc12928413d0690a3b6692ffd0b32cb94
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7APtwdRW4M/5qAO:8vnuGqfGOqVBP+dlt
Malware Config
Extracted
C:\Users\6w01f223u-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/32F6FA8E44529F63
http://decryptor.cc/32F6FA8E44529F63
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\K: rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0knnq33291.bmp" rundll32.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\program files\UnblockConvert.reg rundll32.exe File opened for modification \??\c:\program files\CheckpointGrant.cr2 rundll32.exe File opened for modification \??\c:\program files\RestoreShow.avi rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\6w01f223u-readme.txt rundll32.exe File opened for modification \??\c:\program files\StopAssert.midi rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\6w01f223u-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupSwitch.snd rundll32.exe File opened for modification \??\c:\program files\CompareConvertTo.scf rundll32.exe File opened for modification \??\c:\program files\ExitUndo.ogg rundll32.exe File opened for modification \??\c:\program files\PopUnprotect.xla rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\6w01f223u-readme.txt rundll32.exe File created \??\c:\program files\6w01f223u-readme.txt rundll32.exe File created \??\c:\program files (x86)\6w01f223u-readme.txt rundll32.exe File opened for modification \??\c:\program files\MergeLimit.wma rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2120 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2120 rundll32.exe Token: SeTakeOwnershipPrivilege 2120 rundll32.exe Token: SeBackupPrivilege 2920 vssvc.exe Token: SeRestorePrivilege 2920 vssvc.exe Token: SeAuditPrivilege 2920 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 PID 2116 wrote to memory of 2120 2116 rundll32.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1928
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b5e45ce0747bbe25664505968adccd7f
SHA1deccc24db83b539f61e82e78afeca356dc984ab8
SHA25642a457d600efc07b989e8f594198bd5db006633a78bb7d136e0c9565ff77ccd9
SHA512f51cc1030847b7fcf11989440e55fb8e47cab04b1042d34ceab958923527ccfcc79d15508fbc7b878cb050ccb5085d1c4c62b3c6f70657bafb8f14545b5448f2