Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 01:14

General

  • Target

    c1fcb12f4bd35ee741098773f58cb31a_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    c1fcb12f4bd35ee741098773f58cb31a

  • SHA1

    894be87aa90dd634125497f8b8b5e784be1c385f

  • SHA256

    8790c52ea21760fde53f3e8003cd23f896c8c7b12ccdf212a615eece41aa5b97

  • SHA512

    b67a51c7780d72c5957d4379f6887c10337017979dbd847fa49ceff9100450b2e010974051873dc3675502d249ad4189f7a4f7d89953d297493b5017b4af7ca8

  • SSDEEP

    1536:bs2B7p26CaItF5gNHhKWluLpWmRHICS4AH3o/qTneyW7ZZOBml2uBbKbxoVgAy6B:9fg0NBlu9CNTed7/kBazzFbULREgMT

Malware Config

Extracted

Path

C:\Recovery\how to decrypt 29d080u3i3-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension 29d080u3i3. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5986525EDB942762 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/5986525EDB942762 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: vD5FGcKNZoIuRQR1GHeRI5DlovOMO4KHgvvLAnxBccmZVt79XG3kw+utWZHOg2J6 h5c0VctcjoQR2jD4MY0FRWTv+IS1Jq0PErGyJ8m3uj/ih7t/G+QOvP4NLNkT3UPY NSD182790AUGTgkJUY+wozgOL9YmVadjGXrcgKIeltL8Qtxzo3adUf5SHHQUksyM nu6ba9OI/3acVsad7Ln3OCrOFaf+9WkIrcTun5ue/97ogyibujp+XOMZDQfy9Kq5 lUE58C+454TvqV5Xp9AnCZVXT/Fv4pObpkp1imZHKspPom4uU5x1uJVysJkWBMdO IpDUAk+5wT4FumormfqJnTFw4ikNaSIWaz6dlPy/0BYmCzgLEOloxkfLDRwy/Jzt jwyM2ovqUZ8pmSXMYtCnCg0EkJGvxSSLPQDchWyDcCC/6qkj6moZk7K4OQOBZapO eUcGaTwe0aoGItAPsogwx+I2hjajuriHqXQTY7xY0sPxi9fbPFgN4VYjNcZ6fT1j a/bX4ALwVMB/SOq19Wpsz39D81k5nzMT+FYku5CYyO2Wfn6BykYEdio/+XnYKKp4 cukk+sAXG/emDo7LId5M2ulgr0DgThQDRKSo/pfQtwPom3hyELX+Z1QROeLXueIG fqddLunhIuVYFgb125wK19Qms0SWQD3RRkZEbYMP1IMUqYG32nU7BSV9+VgtIxv/ 9kiZ1CFdbK9f9Rv/olbkyqdVq8uED5tQCL11SztLYR5LfjsufSB0v76BQOKna6S1 2/8is8QHmKieZFRjgRwIrVUhd2Y5Xw40pl2rDmp5rgBcAPy0924t2Sk7bI8X7xxT B8rRKbwaVNHZh4RftZZEYSJinx8ApKgzYrpcuR+2v3UA42ZlDcce5MmdkpfN7Cef 6vTZk5bsG4BOPnuGXnjd1SnnDNcgnNHGPSS3IoLwmaAsYCnv5x6miwqkOKU5HemA d1uriRiBqQ1P9JPZaa20pJn4nwswlRne0JNujlV9pOfDIfugVMIaKcPEtO6/qs+r wIBNxdSqu62wMqUmn4jDyxf0hhZ7LSf3bZa9ut3XyPzgVGJQa3SNz9MFhERHvbwS hK8y2RkJEORfjnKsqzZMu/hYf29D1cngUahfcoVxPoBkCcIO7c5Jtsuasj4ShYFm SYHV9y8j1cWwdkVWFNO8z3OD9tMSKhmdMP51EHI5/+V+ZEsn76vw6dr7rOderF6K HVP3rnlr7t1J5nrUebVd0pde3gKE4y94VWo= Extension name: 29d080u3i3 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/5986525EDB942762

http://decryptor.top/5986525EDB942762

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1fcb12f4bd35ee741098773f58cb31a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c1fcb12f4bd35ee741098773f58cb31a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1540
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\how to decrypt 29d080u3i3-readme.txt

      Filesize

      6KB

      MD5

      191cab4c0ab317b77cf2640a1d7e5e6c

      SHA1

      d48f47c9dfaec9cc722d484780a58ddf2496ce32

      SHA256

      f8fdc3902cd58a59b7af7ebbf3095f1531b5bf0af3b538d8060a360eb3cedf74

      SHA512

      563b965fce6239762300afc3a3e92eccdcb405d7b1b25ca9d9af7c45eac2fe542b55b2e69d717c7698b067b01b6ae64bec7d2a1382d17e43c2940ce94abc0074