Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 05:24

General

  • Target

    84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe

  • Size

    647KB

  • MD5

    84f15cd1e1ff47e8ad87588ce955618f

  • SHA1

    314ba101ce78f33813e7ed4262d80ed7055a2d0e

  • SHA256

    7e0231f034f5d8f1e742373f80f850ad2c22cfdaf1effde4a69d3bfd6c59cba8

  • SHA512

    20beb8c116eeac4ba585a24763eb06fb42d9e1f3c764bb4ebff946101edaeecd0ecb006a8b177eb30267adc879623d92fd0d26aebdab4148d18efb305611c62e

  • SSDEEP

    12288:0o9pcHUBfjhwHekC8k0u4FMgkSL/meZLgFl6pSKBPKvgqub1a:0o9SHUBfdwjrBjMJyuELOl6mvg7I

Malware Config

Extracted

Family

sodinokibi

Botnet

23

Campaign

823

Decoy

cascinarosa33.it

tetameble.pl

eshop.design

blavait.fr

epicjapanart.com

theater-lueneburg.de

handyman-silkeborg.dk

uncensoredhentaigif.com

sbit.ag

mrkluttz.com

netadultere.fr

mindfuelers.com

domilivefurniture.com

trivselsguide.dk

duthler.nl

amyandzac.com

yourcosmicbeing.com

poems-for-the-soul.ch

haard-totaal.nl

keyboardjournal.com

Attributes
  • net

    true

  • pid

    23

  • prc

    agntsvc

    isqlplussvc

    ocssd

    winword

    ocomm

    dbeng50

    infopath

    msaccess

    synctime

    visio

    outlook

    firefox

    thebat

    steam

    onenote

    thunderbird

    excel

    mydesktopqos

    mspub

    wordpa

    dbsnmp

    ocautoupds

    sqbcoreservice

    tbirdconfig

    sql

    powerpnt

    xfssvccon

    oracle

    encsvc

    mydesktopservice

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    823

  • svc

    sql

    svc$

    memtas

    veeam

    vss

    mepocs

    sophos

    backup

Extracted

Path

C:\Users\27a7na6-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 27a7na6. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/39C97D591F0E7421 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/39C97D591F0E7421 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: EyJhq6iVjSaSy+jTFVyM5Tr9zm2bkFnHQoBYbESm8GBWe1YCZsmDXNGeCNoeoLo1 KVGVfAy0bQG3LXIO1OP+iFVExHeen5i2Yg75pjJ5g8MiXORJ+72/DaIp8FGRAd9Y 09hww/yNXxH5bx2Qzb6SXNPPdsIE+4GTMebdFfV0A2qUrt/c1s+EB3qe9KzXA2/K VPGpNn6jf6Djq7QY5aTncXrm+tvAtTftYKF9EW40oiJyPpSmJy6mVXNU4U5P2jHt obhP2SdEyPgYtl4Xja18Dbd9r3GlAl+m4awMyKx03NI5Qk0FmaO2cQyiWcuBZxru tBkD1tyKB55b69EHDv9dbhTeEoSxK13QRcI/kg/YB2jN1I4ZdDq6IeJ+E6cCTl2l p1vEOoifkfwPE5xLvzeuEsT656lkA6AZGSujtNZzD1SgbS3EZYEK4Z7ZQfbKErJa 4YKowV3Dayr3LTayYZyajhd7MkbSZqpKS/yrmK79Gwf/NaglNQORP26caGZByVEE eQtMClp2nZTNAOpdO0Dbp+qNyHFBqoojRDqfGCRhZASRptv9j1+32thmvJQMDoFh 8TKOoMqCu6zP3uLJR/w3pGF0sjoWtbUiQwDa7cNG4PjsQ6nEE+tIdKs7xkBpIoEQ fM5AzLUY0a2uARPJ9GWo0NtqTalLecnZzY117D/ZirHAiRn9vi+5KLU3pjxV1FBW YXAu6gj6L4NRSmpX3ZdPxr3AKamSdvYf96o49cWhpWXVjWo/1XQ62Zo1B64I+W22 E0JbbmDQSFff7KB0o77br7dkIFWVxkfUae9t1R+ZKmgk5yadCB9YUWqamzrx5uAO 9T201Rf6Vk6GwkdDc0G3NGRqy31WrqNVH6Sq5/7bpx7q3qCkjfINSN+7nK2bXcCi 2hrzv8Egup4WR1eR+ZSDRtZ6N5Re+FSDS8Lo2NZUlkO5VUTAwY0gxocr923HINl2 nv4mkpymxB+PTxW+w5X7fTghQn92NXYojp5SmyL9sRQbV3WR8vvsBlHswuvt9ss4 E0cssFhse+6O1oHtFMLgVZvfAnOxLEEkYisflQyteD0pJJ6SRB8QBbzj/igoJY+O sh/ZURAUN7F/4/e2zt+gvS1YfdI9sRa1DO0E9xm5ju3TcJyoSl3doR3FZ1LWzJSp jeDwTf3ghGGcAqpRTCJBSfsqcgsOdjQVScacXHLSKHc1p8bNXTjAjOoLl4gSAscO EdeWDQ+8QEJaxRCTDqc/xLMk Extension name: 27a7na6 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/39C97D591F0E7421

http://decryptor.top/39C97D591F0E7421

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84f15cd1e1ff47e8ad87588ce955618f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3496
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
    • Modifies data under HKEY_USERS
    PID:3628
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\27a7na6-readme.txt

      Filesize

      6KB

      MD5

      89efe4c2fa0cdf492532739196f44e58

      SHA1

      26a9a0f9e38a01992b5155d76bdbcfae80f85176

      SHA256

      2ba5bf9a9aa2dbbc38c08706bc62f58e451541a6b7be5b254e4703b25bc31e2c

      SHA512

      c7987fecd1421998fdae804786f8b4b65dbf28e4a5677bbddcba8c3682c7f3a800bbaa3212ba86f7ed80f4ed4fa7bb60b77ce25c3cc37e7500ff6afc4212fd08

    • memory/3464-13-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-504-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-11-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-7-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/3464-6-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/3464-5-0x0000000002540000-0x0000000002573000-memory.dmp

      Filesize

      204KB

    • memory/3464-9-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3464-8-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3464-3-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3464-4-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3464-15-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-14-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/3464-2-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3464-493-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-497-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-498-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-500-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-503-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/3464-1-0x0000000002540000-0x0000000002573000-memory.dmp

      Filesize

      204KB