Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 01:53

General

  • Target

    c20ceab7c093c47be023c81164b544ce_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    c20ceab7c093c47be023c81164b544ce

  • SHA1

    de182d48bcc37bcbd1a25f22a0fc6619ce96f69b

  • SHA256

    207b3353fa8bcb64966ba9f126e62753a00d22ac3702f2bdd34ec658d6d6144c

  • SHA512

    add2c95045cfc9313d03e5b8cc351e90d0d82f2758208f48800db2ad02a39f8f8c60bcf8dce089d5a25e92e9ae2623cb30fc164de384620ce21276d261b32361

  • SSDEEP

    1536:LzE8ZQwf8u+MM3PqBmD9PVpVO0Aj7Pbi4eTMluxtXDCntTnICS4Ag9JbMBBjV11l:Kt38mD9P3ILbi4eTMlwDCnumU9zx

Malware Config

Extracted

Path

C:\Users\82c6u0wh3i-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 82c6u0wh3i. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1C2E4F6D2C2D4181 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/1C2E4F6D2C2D4181 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: nu2ADMOZh8Sce5yK6wGH/igJorG0wmc1NdweUggwWg2qvF9cJ8JPXgMe+fQyRaJ8 jXL7e4K8NH/6dKM6ZSdGj8EIt5eW+udoPVjqyBzPn1zfGVTFgHZexaZ4hs+BQu1U QsRqEmeUryA5003C8q+KFa9ue2RL8lPj6iL7UMPw7xnRASSiRSRv85CN13ALVHdI oSpXXcUmfHRvuC584wFpLDiMg35ShHk+ak5PYx3DIZAV6ziioOxLRy+YYy5THfuK vxlv5sni9Hu4MmhWjQmJ5rkYdnktBq/CO1O3RZIyyOqNqxPMMxStjGk8Qt/aiXAg GAX9wO4bYzr9RpthrjbSWdsq8jjGl83NkL+7vBseffQLekYFuOXRoGtbfNMj5krR SZvTzs+D/+Mk1t837UgkoSBWyDs37kBdA/CJ+Y4pXHPmCn0Wyjy4pUBNAfr29r83 BsXKVlcERxw0XyLdTBUKcY6pUtnSovWRfNz5CYkEcumsecutGdomZYoro5N+bCiL nQohHWlFQEVKFUigvD7HJSIDuSHfGtM0e3QLRSAJ5KXkazhMtBUdVL40G7lU+4IZ 1fZ6pr6OTYevtdnl7bPt701dShUuV6Ev4CVlsEFmOQAKVb4qSe7LtAHkTHNkINYl y/ctKGbWJ+1HVBkTtT0AsAei8pjFH0h1VZiy2jhWBHf4SD9aCoft4z/c96gwih6O BylCiAjDB1BSt4Aes2JfAjmh9vFR0ocvh90+3y14FaLdsY7SbZmtKb+4e8ivyX/G cOoRh6qaM3LLSFH8MdS6o9aKv3qnYE6p5r26Qz+npFroeGjnlvgRWld51QR+4tnn G29dpUfvOmF/6+MU58AnepW7xH7/eJ0NMvkT8OfR4/Hjm0/BILYcbaNl79bjU5pF lU5P1KjRumFQGUt1+vhdVhx6HH0MMj0Gn5F5p2Mk373MNytfviG+UJfu6YIJDyjl Iqmdt7tFFqALoP/ZkWbWYVtIZmNyVtA3WTB2LnBcqpvgIaaLwOAj5DbDY5maC2or D6IJyM4rYM/MCXJGWPkNbrFGwx+cbHkNnSHbw0MTJDdil2CVDaEzJa2hw+2FlNey 1bvjLpwP9EKsgtd3bW6GRp8al4MEjGDbSPAdC2mVGhYRhDXJ6oSbnZGlMzQ/qMpP zIRUO69hsm7/Rtx81/vKDKE7XvllIQoLPpTPiQERmMhH+CJtM35DempocsDE0gmm 233JX03IuXQYCe1j5VBZvbOTlrJUXA== Extension name: 82c6u0wh3i ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1C2E4F6D2C2D4181

http://decryptor.top/1C2E4F6D2C2D4181

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c20ceab7c093c47be023c81164b544ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c20ceab7c093c47be023c81164b544ce_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1740
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:8
    1⤵
      PID:1820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\82c6u0wh3i-readme.txt

      Filesize

      6KB

      MD5

      85d5d9cd54377ace146f637d94d74e2c

      SHA1

      c6f0dd2154b94b76dc59d6134e5e8a1646fbf6e6

      SHA256

      daa61698fa4317381ed4098b539020daeed7bd7725d9fc747a571b7bddb0e891

      SHA512

      0ce33fcb44df61f70160b62a849daf52188ac9cf1d1846b6204a00d2faec36bb48d1c3552766ef775a5c31e6d48a1d8c1bc38a608b49541eda6e4daaba8dba54