Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 17:40
Behavioral task
behavioral1
Sample
d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe
-
Size
179KB
-
MD5
d0190f94e6d05104977c53b55dbc2911
-
SHA1
c0ff002b0e26b180a741c3cefff15190df7746cc
-
SHA256
f4e5d7a95681d920dda75fe5dd89be249905e2a7712f9b3b39e19351f5ef5e69
-
SHA512
d4b1cc032f9d8254ac6035c27948147d8c4c5f60be51e632ba26c6e34ada87515b3113b4bd1cec3cedfa1a73c465a1267681ca05356d8f2f08d81c4fef04d868
-
SSDEEP
3072:LNKQ4JTBg0Q8F63VETed7/kBazzFbULpC15RM:LNn4FQS63VE6F/M4qE15
Malware Config
Extracted
C:\Users\7m7n045-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/557D3C3EC7AB7055
http://decryptor.top/557D3C3EC7AB7055
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification \??\c:\program files\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\links\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\desktop\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\videos\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\documents\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\documents\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\videos\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\searches\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\music\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\libraries\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\3d objects\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\onedrive\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\downloads\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\music\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\public\pictures\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\M: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\O: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\X: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\A: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\H: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\T: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\W: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\B: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\L: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\Q: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\G: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\P: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\Z: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\U: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\V: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\K: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\N: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\R: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\S: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\D: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\F: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\Y: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\E: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened (read-only) \??\I: d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vpg792o468cp.bmp" d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification \??\c:\program files\SkipUninstall.potm d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoMount.wdp d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressRedo.svgz d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\DebugStop.vstx d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\InstallRestore.midi d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\SwitchInstall.potx d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\InitializeResolve.php d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\ResizeSwitch.xml d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectRegister.au3 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\StartResume.emz d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\StopFormat.pptx d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File created \??\c:\program files (x86)\7m7n045-readme.txt d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\AssertLock.mp2 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\PushSend.ADT d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\RepairFormat.dxf d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\UnpublishPush.odp d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\desktop.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupCopy.i64 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\RequestDisconnect.edrwx d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\RevokeWrite.xlt d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\ShowSubmit.jpe d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\DenyOpen.001 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\HideUnpublish.txt d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\StopSave.temp d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\UninstallJoin.ttc d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\PublishReceive.xht d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\UnblockSuspend.ini d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertFromSelect.mhtml d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\FormatWait.dib d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\ResizeHide.eps d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\SearchMerge.zip d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File created \??\c:\program files\7m7n045-readme.txt d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearPublish.aiff d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\CloseOptimize.001 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressApprove.docx d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe 1480 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3552 1480 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe 97 PID 1480 wrote to memory of 3552 1480 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe 97 PID 1480 wrote to memory of 3552 1480 d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0190f94e6d05104977c53b55dbc2911_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e2b0be8292e176f123e908d509a600f9
SHA18e726f8a76e54a409c15a9d0d6ede1fede442e52
SHA256e5d0b044e0504848674acf2484fa90744a52b6d3f528eeb532853bd5bc31a8e7
SHA5123fc8da1f1c2d929814de0ee9a2e08ccd6e8d5a54c81bba2ea67e57c69e09305e8d155470cd6605ca2def7522810ed3cb7d1ce0662d2829c91ce18b6915745da6