Analysis

  • max time kernel
    13s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 11:56

General

  • Target

    cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe

  • Size

    161KB

  • MD5

    cf79091ecc42a35689672b62e7f968ec

  • SHA1

    2c5245ebb72616cdf03f4b1a974de2c4ab9f6c60

  • SHA256

    1937098609fbbda1b470811a7ffe5fa044058655722d84bd029050d54f2b1496

  • SHA512

    031b650d9ee48a531e27871099b40a1901312e4678a79585f33d2e9af7ecd0524c3239c2e3bb7e84ed32bce23e74f755bec9bb70d1e15b2f21a26bb980d343dc

  • SSDEEP

    3072:Hp5SexkWi1Lbi4eTMlwDCnu/qW2couRTE:JvGWwbnWJ/X2c1E

Malware Config

Extracted

Path

C:\Recovery\qyoy2q-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion qyoy2q. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FDB7471741C3CA92 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/FDB7471741C3CA92 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: iOYjKmx2S48TvO36p7F0wGeIfhbxdMVqXbJlbknm8Isaov9LRfK8zT2URIsSz/jV PCLrICx3syhH9ZiYb7+vd+ieGo7/4eZdl08g5N5OLuHhcJUitdjlYcHBbgFfgYCx QFng0VtLaaaDMXyHi/3k77sdYXeqSibQjP6DENT3nG1jG2bq9QOHqS4Yf/u2BgpH O0gPANtdUUi0Fcgji9B7gubUhwytmI1Nm7VhYMs2mEXZtpZeJmYcZLVQftbq82n0 IK9944SoQv+YkXu9Wzkixr/26Qk8Rw1dxyAhkj2Nmrv7gx4HaFLejE/gIHCBpdU4 hOqLYMUY19IMAVql7xZYg00Gw6+ipy85AK7X9LFdQnMPfsy5Qu2Gy+F1VB87U3Dy +LComlIrL071F6Ct+dkH9ZGulhFq1JE6hkm+5w0PfJBg+/PQoALZe9Y/8kLmqq5v tGb5R9CQo5aaxJ8xfv/BBI0omBKCUH67YUVTh/9RDMUmXFnwb+A0nBNMABqTa/tJ fYIR15vPK6T4LPbksQRjDXOO39CfQVemXiEUyw0SKAGGCspjBC43tPJ9toxAeCL3 jIhNjEqBiqOAtCNZc41olXgvXnnsFsl8FeOWa+rZoTcUfDmnvkEckHDDTtKF6Ble ssDl7KLMCv1crN6z6g8StFo6Z2PbRi5nvbgEUbBEOgIJtWIaQLhGx5QubmC4ZWTY /V6+vwnM2HD4VA2MJ5L5yG7eFWhPN2CThqbRB5k7sLhiqz3dQkWj+fa3XWJZSQE+ dj4uIccmXid71r0j/S4CfUssUtA2KCnIR6m3uIjuNDVgjKT1ptsq0d4s7+q12hi5 U7ZTetjoszjoOrgV111ilwzo5ckPifMNGnXEzvGHXuNgl/+xP1m0K18H3Zq/XU0G F2RcYS/lrw6nxMSmxyoM+MVwjYIOY9ubc51ddkDWpxgYASah/4xdYdXvr3Mtcwad PSmlPy43bhO+4iKBAWSKnOljh6uyInL7eA0NyIgEmYhan3EGDH/wLsgYhEbsOmLp ojx/voQna12UQNFWxTRgBkmAqfMaGcPMX6pN0uMov6rVM56Pj3RYPbX/ADdQFL06 GC545VwJZpu0tznKFrXSayDwpVvWlhJo71JGClYeo1T7ckVslHI5Jryw/BCI2u9W Qz/2t4KydmWjbwdHYUeT11OTB9ddAw6EUeD0wOmeMpp6khgTUD2wlarxVBHubgCP 95Opgz1FvS5YDA== Extension name: qyoy2q ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FDB7471741C3CA92

http://decryptor.top/FDB7471741C3CA92

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf79091ecc42a35689672b62e7f968ec_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Interacts with shadow copies
        PID:2080
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\qyoy2q-readme.txt

    Filesize

    6KB

    MD5

    f13d1898e24843768463a00d634e2a1b

    SHA1

    9637be1833d531ad6c0188b8b3bfb4b1bb59df89

    SHA256

    eafc6fd88632c60e029efe1ed2b6eb53254789a11c27a716ffbaff06427e8762

    SHA512

    a47cd4d1541932e18d0d7bf29b4d9021746825936311c6ad4587772ee1881542afbe5e505938f81ef6770c200e0f94ac8e396d55c2106341f651bb69eed0d845