Resubmissions

06-08-2024 12:58

240806-p7wxwazcqq 10

03-08-2024 17:38

240803-v77x2azfqn 10

30-07-2024 18:36

240730-w9akzssfmk 10

28-07-2024 20:03

240728-ysq8hs1hkq 10

Analysis

  • max time kernel
    42s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 12:58

General

  • Target

    20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    20ed7ed36e052a523030ae979e872793

  • SHA1

    b686ea3f47c254082c584ee9d18d386af4e0c870

  • SHA256

    bec5d4b9979a2094fe1062512ea2754b9ce573b879b25167fa8a4f52f350edc9

  • SHA512

    7df169ae3bf9bf85205a7b5a4d5ed33aed897073dc003a7ef1eea529473fffe005b549bd72e9f098ed958c8a5232640dc12928413d0690a3b6692ffd0b32cb94

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7APtwdRW4M/5qAO:8vnuGqfGOqVBP+dlt

Malware Config

Extracted

Path

C:\Users\jr077i-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension jr077i. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9638D8874D976FCB 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/9638D8874D976FCB Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: y4Ep+oKpHQJkVmsXTJ291pIs9NvDS3/i5LsYjVfmpCQsiqxrKRq3hCpzHTBGLcnr psnRUTH2kwMsYcbhlqvtKAUNiTr6+b2pk4x3fSY462wFLE5DEdWoY0Kp+We2ii9d tVDKEKQhKY2mPVxv50BL4PljTeJDfKXATxNkWU7DsODxOp8tYkwwH5kFpxD0iQyP vHNxsS6k1QXjoaF0+ImmzMUiSTGsqlxCZxG7NvrD/dmOywawfFI51uecnDoT+6Wm Iio1ZP89xJnbVlOK3YWSftARKJ0HX2u0K9KA1124QaJFd3Pg/qzeLRdKcY2OemSL wZzttIPy42WQzwbMGun5S/asMC17XEqyw1cZLfMKrAUoad3E6Dmd+TOYnLysYikv zuP7tb/cvgc6KDx/GW9Id+s6ncXGbfEQBZNzUgFcS9X9IKVJbleqSB5Y6ELLhdVk qPU7I9HE7rPXikGiAsbLfhJtL7rzABX8Ts0HQOnb1EQpm83xYhjNkBZ1CHgMtvlb 9OtupE2RiGYZ5ADbUq88UBFbir3PWqQdyEaNqEtjEpiex3sdoOnGlVZZfwSRZoLv JP3sbVGvMWCNGJ4VT7nbO2uojTKHpL/ClqFpau6Cm2nt79OtUCCcjdOXPURHeK+l 54NZaP+K7zwAJaaCr5g8IgGyW0kKHfiwb9TT7kYG2UDdngKFv9SQ+cWIhhukwYUb rcxnJBjQFDnnpojIyQksAIKulKpQbNP2IfPqxHIWehYdy4X1Zrm4l9NaSiY0JtG6 i31NvIA8fl7MtXHDLj019XwQIqfjY1+6o6jAJ5vf/u4zRealTQuBg07NOj++LpeN eXJr3YPF8QCympVtPEMutbcpEHFHLsm6eDlhPAh7c65dlhko/Y/NdC9wr7woWCvF GtlrxKN8M+m/0JeJzX+1BTi4VFdXFqtaoBTORowiufSI730k8HX5Z95wiQ9gqPMO MLqTsgf5mSj6iC6Qah+vugfqqZjxlLbP01Ny/kPHgCdguTJhc4V9pDZHSJQxIqj9 F/01J4mU6jXDni1lXg10rGQ8TbX830J1YHzDI14jQeyP2JPHKu6LZTcpRHi28bfl 5kNV+xzcmX8whV/DGyt8M4lYdttIOdSY1xVPqNlBwttqTbicA9Gc1wV4xZmrYc+Q PErjQsVR31MJO+AUVjplcZ3nJpekmkDWJYr9URHgN3zISwmH7F4h6CEYmVh63HYb VyagTnN8IFJw/lw6rN7/e28vAl6w5GFnQyzkW10xyQRmjU7HWgsr+aKd+1guOBVW IxhoJZda9ITPCaEVUFuneQXuKXKCOsuqwCw6IK8uZA5BtMX6sgpKRCQ4AMhDR6NN LQHt1hmL9R9rK2rCy+MlvK9doqr1hK6Mq8CLHCOtVZvs4Pm29Rg= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9638D8874D976FCB

http://decryptor.cc/9638D8874D976FCB

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 18 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3672
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2040
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\jr077i-readme.txt

      Filesize

      6KB

      MD5

      1e32734abc0b0ad17c95d689004a84ab

      SHA1

      d454836934ecb1c60ef3dc400350eec728b87dff

      SHA256

      f15fa96dceefd86bbfcc25fb34b7392c7550c5af51c1e4c23fffcd1ac6186f36

      SHA512

      5e3abe096c6162821c28df754ab5f16829d1c1153c621e9750e13cf79203ba940093cb48ce3566755c7da9d528184b417e4b9e0067676238e335187509f20e75