Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 05:24

General

  • Target

    84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe

  • Size

    647KB

  • MD5

    84f15cd1e1ff47e8ad87588ce955618f

  • SHA1

    314ba101ce78f33813e7ed4262d80ed7055a2d0e

  • SHA256

    7e0231f034f5d8f1e742373f80f850ad2c22cfdaf1effde4a69d3bfd6c59cba8

  • SHA512

    20beb8c116eeac4ba585a24763eb06fb42d9e1f3c764bb4ebff946101edaeecd0ecb006a8b177eb30267adc879623d92fd0d26aebdab4148d18efb305611c62e

  • SSDEEP

    12288:0o9pcHUBfjhwHekC8k0u4FMgkSL/meZLgFl6pSKBPKvgqub1a:0o9SHUBfdwjrBjMJyuELOl6mvg7I

Malware Config

Extracted

Family

sodinokibi

Botnet

23

Campaign

823

Decoy

cascinarosa33.it

tetameble.pl

eshop.design

blavait.fr

epicjapanart.com

theater-lueneburg.de

handyman-silkeborg.dk

uncensoredhentaigif.com

sbit.ag

mrkluttz.com

netadultere.fr

mindfuelers.com

domilivefurniture.com

trivselsguide.dk

duthler.nl

amyandzac.com

yourcosmicbeing.com

poems-for-the-soul.ch

haard-totaal.nl

keyboardjournal.com

Attributes
  • net

    true

  • pid

    23

  • prc

    agntsvc

    isqlplussvc

    ocssd

    winword

    ocomm

    dbeng50

    infopath

    msaccess

    synctime

    visio

    outlook

    firefox

    thebat

    steam

    onenote

    thunderbird

    excel

    mydesktopqos

    mspub

    wordpa

    dbsnmp

    ocautoupds

    sqbcoreservice

    tbirdconfig

    sql

    powerpnt

    xfssvccon

    oracle

    encsvc

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    823

  • svc

    sql

    svc$

    memtas

    veeam

    vss

    mepocs

    sophos

    backup

Extracted

Path

C:\Users\otvxs4xh2-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension otvxs4xh2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/941D287A520BE8E1 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/941D287A520BE8E1 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: BzUYJ6PbCW6+Nsr1w0/Y9ga+W0WdJqN9JRlg32mrrc0cY3xa+4TfejWPNIuGv/Ub THuhiFx68MrBsgGKOefY6ES0B4bIdBSPCzWPExP1qbU+zESaYmD5udq8MXLc6oWb kkUDlKcK24NxXUjlMUzJN/YrLWLk4Xg5dCLQoJn6v6I18CWUAswOE3ADQ2kakszw +MMsA6iVpXRVt3+iF3XLyjRwwqLgtSGxvsxU+ETNBHY6X5naAP9qwcqMfMbXGVEj jIjKtzwi1C/Qkdznj2XUCHASVKuEpQhd51ItqaFLPGCs2Z3zX1AuAViraI8cSTqZ qXHlxGFowgMm525GtJSb1KOr2YbryyEcVpBF4GegYxOKmbVdAoRYDjpVaQ15k92W 20UHzOKJgSasvn3AERt4uRyt+jnjFwSsagCivDMzsEHNvyrs3B0R0krQm2RQbJSJ ZSgyQNVBcl/Dy29v2c8UKuZiFPPvYiCikOc72NUZHLUWPIVqVXow02tKdmCiTOi9 Zr6HFboZk8SdSyTiBTp60Qan62AqgtnT+wtC7LIEJTV5M1JoOIi4G0poOnPgraeu Clp9mM13peGZbH4sh13fRaPbutY54j26zdra28lNv+jlFxzc6aRUFMSIQ6HFPfIb C0Y0UOOh3M1WMqV6hrGte2NBT/W6ad9W9g0oG05AybEcTwVVfUiv8Bb2NbQsh5Yj oHxEqjwoZSa7Tc1yvJdgDR1AbYxlTShqrr+pYpYhwpDkJXiTdMHyoayOQrzGOtc8 CfOZzg6UIBlayzEAFGR5VYshf6crIjqGjEN7QdVxntm2S98tzK3BWjA9ampCl6GX dMxds9+mYbT25CRR9EXJDf/9pZKPRRgEr1cnt6o+1AB0JNuYXbIEiYguKFhB8OXp U9SZajQpgrkrIKytkRQzeBIUcP5XP8pSFuHYbsAROLMksDmixlUtU0t3pMFUI3TI aAKzSoPelPDRpaTrotn5xYGy6MWB5S5FxGcE6BwaQA46e0/U8Whr4My8VBUWm54H hoo6ARWZpb7aHOqWbv2x+pRPOAcWhDMf65yzYtBH/n2zdlMeAYiUKzMPK+bJKIKX arlDBOyrd3ERkea1JON1ZhT7cCjKOBXEufCK/J92YU2i9zkDGqJskSISZl2XhqOi SSI2qF/+e7pGUTELblOEFOIOy7fxusNmybjrtc5VZmJ0BWZ6Q3ELr5XhqS7Bv+yR tApczOScOa2FprMKrLRfsQ== Extension name: otvxs4xh2 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/941D287A520BE8E1

http://decryptor.top/941D287A520BE8E1

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Interacts with shadow copies
        PID:2312
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\otvxs4xh2-readme.txt

    Filesize

    6KB

    MD5

    57f7cb52a466c561fdce879119abde41

    SHA1

    948d2e1ceee85c59e48560988dcd96d7925a73de

    SHA256

    bbd983b713b0ec74fc8d94bed69ba63e24e9999dbcf4fc4db7e322f989ad7dbf

    SHA512

    9de97b0b99ce8403854ea585e3d4baf9972c3556a5133fb11b038444787ecd13cc15f17a6a1b9e66e8bc6194b0c45d8dbfd14b5fc640e9a2382dbb24d89688e4

  • memory/1644-3-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-4-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-12-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-13-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-5-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-6-0x00000000024B0000-0x00000000024E3000-memory.dmp

    Filesize

    204KB

  • memory/1644-7-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/1644-8-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-482-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-2-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-1-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1644-0-0x00000000024B0000-0x00000000024E3000-memory.dmp

    Filesize

    204KB

  • memory/1644-469-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-472-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-478-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-480-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-481-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1644-9-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB