Resubmissions
07-08-2024 18:16
240807-wwjlqs1hjm 1007-08-2024 18:14
240807-wvf48a1grn 1028-05-2024 08:02
240528-jxc45abh5s 10Analysis
-
max time kernel
1365s -
max time network
1154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll
-
Size
166KB
-
MD5
7c421ca94c441a4b74d364f952f8739c
-
SHA1
e5de78ae8db1aa78e00c1fa1eb5687cd1519843c
-
SHA256
7afc7a311740da58cb0b7d6c43e28b1ddb6fce9c67614e74902e552b330287b0
-
SHA512
0eb45486ab306562c267eba5eae7f1b8d6d551b83603d136865c2e1c7c90abb0067effc4a358649846dc89ef37ad9ff266922223f318a631d3f457792f1df4d2
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QDhqtUczTajkz+XHUU:NJ0BXScFyfC3Hd4ygV6oPHU
Malware Config
Extracted
C:\Users\x0cc14aq-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8EA0FA9523497AAF
http://decryptor.cc/8EA0FA9523497AAF
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File opened for modification \??\c:\program files\InitializeExpand.htm rundll32.exe File opened for modification \??\c:\program files\OptimizeSync.ps1xml rundll32.exe File opened for modification \??\c:\program files\TestEdit.MTS rundll32.exe File opened for modification \??\c:\program files\ConfirmBlock.bmp rundll32.exe File opened for modification \??\c:\program files\UnpublishCompress.xls rundll32.exe File opened for modification \??\c:\program files\HideReceive.wvx rundll32.exe File opened for modification \??\c:\program files\SuspendPing.htm rundll32.exe File opened for modification \??\c:\program files\UninstallRedo.M2V rundll32.exe File opened for modification \??\c:\program files\SubmitConvertFrom.i64 rundll32.exe File opened for modification \??\c:\program files\ConnectHide.wpl rundll32.exe File opened for modification \??\c:\program files\EditCopy.001 rundll32.exe File opened for modification \??\c:\program files\FindRepair.midi rundll32.exe File opened for modification \??\c:\program files\GrantUpdate.png rundll32.exe File opened for modification \??\c:\program files\InitializeUnprotect.ADTS rundll32.exe File opened for modification \??\c:\program files\OpenResume.wmx rundll32.exe File opened for modification \??\c:\program files\PublishResize.png rundll32.exe File created \??\c:\program files (x86)\x0cc14aq-readme.txt rundll32.exe File opened for modification \??\c:\program files\ReceiveFind.wmx rundll32.exe File opened for modification \??\c:\program files\ReceiveMeasure.dxf rundll32.exe File opened for modification \??\c:\program files\GroupSync.csv rundll32.exe File opened for modification \??\c:\program files\OutUpdate.dwfx rundll32.exe File opened for modification \??\c:\program files\UseDisconnect.ppsm rundll32.exe File opened for modification \??\c:\program files\DisableBackup.emz rundll32.exe File opened for modification \??\c:\program files\UndoStep.mht rundll32.exe File opened for modification \??\c:\program files\UnlockUse.vssx rundll32.exe File opened for modification \??\c:\program files\ImportSkip.asx rundll32.exe File opened for modification \??\c:\program files\DisconnectSuspend.tif rundll32.exe File opened for modification \??\c:\program files\GroupWait.cfg rundll32.exe File opened for modification \??\c:\program files\OptimizeProtect.docx rundll32.exe File opened for modification \??\c:\program files\OutRename.pdf rundll32.exe File opened for modification \??\c:\program files\ResetNew.zip rundll32.exe File opened for modification \??\c:\program files\UpdateCompare.wpl rundll32.exe File created \??\c:\program files\x0cc14aq-readme.txt rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2868 rundll32.exe 2868 rundll32.exe 1040 powershell.exe 1040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2868 rundll32.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeBackupPrivilege 4092 vssvc.exe Token: SeRestorePrivilege 4092 vssvc.exe Token: SeAuditPrivilege 4092 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2868 2856 rundll32.exe 83 PID 2856 wrote to memory of 2868 2856 rundll32.exe 83 PID 2856 wrote to memory of 2868 2856 rundll32.exe 83 PID 2868 wrote to memory of 1040 2868 rundll32.exe 87 PID 2868 wrote to memory of 1040 2868 rundll32.exe 87 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c421ca94c441a4b74d364f952f8739c_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1508
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5373de8b43fa037f3d3e2a91e9a8052dd
SHA1d67d20dfa6f73f9b58706dfc32dfba6ecac159ac
SHA256dbd2199654006aa68461f31f208663feb7ee5977824176adf0bf605b47a4327c
SHA512ac64774c53ac88a2f4bb878f91088b9d9a2c312cd0d8d43c5cd94446b8316ff6fc8c56923f711d7d1fb2fec90bd7df192dc1decab363203f7da191b476f8d9a3