Analysis
-
max time kernel
13s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 11:56
Behavioral task
behavioral1
Sample
cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe
-
Size
161KB
-
MD5
cf79091ecc42a35689672b62e7f968ec
-
SHA1
2c5245ebb72616cdf03f4b1a974de2c4ab9f6c60
-
SHA256
1937098609fbbda1b470811a7ffe5fa044058655722d84bd029050d54f2b1496
-
SHA512
031b650d9ee48a531e27871099b40a1901312e4678a79585f33d2e9af7ecd0524c3239c2e3bb7e84ed32bce23e74f755bec9bb70d1e15b2f21a26bb980d343dc
-
SSDEEP
3072:Hp5SexkWi1Lbi4eTMlwDCnu/qW2couRTE:JvGWwbnWJ/X2c1E
Malware Config
Extracted
C:\Recovery\qyoy2q-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FDB7471741C3CA92
http://decryptor.top/FDB7471741C3CA92
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\L: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\O: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\I: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\K: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\W: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\V: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\X: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\Z: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\D: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\E: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\H: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\M: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\R: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\T: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\F: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\Q: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\S: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\N: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\U: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\B: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\P: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\A: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\G: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened (read-only) \??\Y: cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3fp4wxk.bmp" cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\5f929544.lock cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\qyoy2q-readme.txt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\MeasureBlock.mov cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\SubmitUnpublish.odp cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\5f929544.lock cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\qyoy2q-readme.txt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoGroup.gif cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files\qyoy2q-readme.txt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\CheckpointPop.eps cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\EnableLock.ADTS cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\EnterPublish.rtf cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\UnblockCompress.m4a cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ResumeRepair.7z cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ExitSuspend.xlt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\SetRequest.ps1xml cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\SuspendDebug.htm cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files\5f929544.lock cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\HideRename.pptx cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ImportConvertFrom.mpeg3 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectSearch.m4a cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\UnblockNew.sql cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\5f929544.lock cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\EnterMerge.emf cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\OutUnprotect.3gp cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\qyoy2q-readme.txt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertLock.ini cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\CompleteConnect.edrwx cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveClear.tiff cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishExit.ADTS cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\5f929544.lock cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\RenameRevoke.mht cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\StartCompare.vdx cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\StopResume.temp cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearMount.potx cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\CompareCompress.nfo cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\DisconnectApprove.iso cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeClose.kix cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File opened for modification \??\c:\program files\ReadConfirm.vssx cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\qyoy2q-readme.txt cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2080 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 488 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1412 vssvc.exe Token: SeRestorePrivilege 1412 vssvc.exe Token: SeAuditPrivilege 1412 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 488 wrote to memory of 2604 488 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe 29 PID 488 wrote to memory of 2604 488 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe 29 PID 488 wrote to memory of 2604 488 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe 29 PID 488 wrote to memory of 2604 488 cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe 29 PID 2604 wrote to memory of 2080 2604 cmd.exe 31 PID 2604 wrote to memory of 2080 2604 cmd.exe 31 PID 2604 wrote to memory of 2080 2604 cmd.exe 31 PID 2604 wrote to memory of 2080 2604 cmd.exe 31 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2080
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f13d1898e24843768463a00d634e2a1b
SHA19637be1833d531ad6c0188b8b3bfb4b1bb59df89
SHA256eafc6fd88632c60e029efe1ed2b6eb53254789a11c27a716ffbaff06427e8762
SHA512a47cd4d1541932e18d0d7bf29b4d9021746825936311c6ad4587772ee1881542afbe5e505938f81ef6770c200e0f94ac8e396d55c2106341f651bb69eed0d845