Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 19:03
Behavioral task
behavioral1
Sample
d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll
-
Size
161KB
-
MD5
d04208e8499134779820f61c15d2ff37
-
SHA1
56770b21d974922a42c6dc80e433490d1aba8624
-
SHA256
d765650f9f566880df22f1dbabcd8da0dc81d6e10ffe3baee3166ac87ab12a91
-
SHA512
4443dce1f06c9ab3843f50546f4d192e6cceeb483ec8d468574e6d555dc560e4abd7405d058e4d6f21601876f63c8146f167e6d25bd3e1a2c46d75bb4e416d70
-
SSDEEP
3072:SrVv1LsjovMDkQjKiNLDIFjKbnSEYaQG8uVsR2q:SrRijAi2GIFGHYQ5yR
Malware Config
Extracted
C:\Users\yrq54298z-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20323DDB754EDD40
http://decryptor.top/20323DDB754EDD40
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe -
Drops file in Program Files directory 37 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\program files\WriteTrace.asf rundll32.exe File opened for modification \??\c:\program files\JoinImport.pps rundll32.exe File opened for modification \??\c:\program files\LimitConvert.rle rundll32.exe File opened for modification \??\c:\program files\ProtectConvert.wmv rundll32.exe File opened for modification \??\c:\program files\RevokeGet.fon rundll32.exe File opened for modification \??\c:\program files\SaveExport.xlsm rundll32.exe File opened for modification \??\c:\program files\SaveAssert.mpv2 rundll32.exe File opened for modification \??\c:\program files\SaveSelect.i64 rundll32.exe File opened for modification \??\c:\program files\SwitchReceive.3gp2 rundll32.exe File created \??\c:\program files\yrq54298z-readme.txt rundll32.exe File opened for modification \??\c:\program files\DisableFind.midi rundll32.exe File opened for modification \??\c:\program files\InvokeNew.mp4v rundll32.exe File opened for modification \??\c:\program files\MeasureSync.mht rundll32.exe File opened for modification \??\c:\program files\ProtectCompress.vstx rundll32.exe File opened for modification \??\c:\program files\AddSave.wpl rundll32.exe File opened for modification \??\c:\program files\BlockConvertFrom.mht rundll32.exe File opened for modification \??\c:\program files\MeasureGet.DVR rundll32.exe File opened for modification \??\c:\program files\RequestGroup.mp4 rundll32.exe File opened for modification \??\c:\program files\SuspendReceive.wav rundll32.exe File opened for modification \??\c:\program files\WaitUse.mpeg rundll32.exe File opened for modification \??\c:\program files\MergeFind.wdp rundll32.exe File opened for modification \??\c:\program files\RemoveSync.easmx rundll32.exe File opened for modification \??\c:\program files\ResizeConvertTo.doc rundll32.exe File created \??\c:\program files (x86)\yrq54298z-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompareRestore.3g2 rundll32.exe File opened for modification \??\c:\program files\ExpandEnter.bmp rundll32.exe File opened for modification \??\c:\program files\HideEdit.ps1xml rundll32.exe File opened for modification \??\c:\program files\MeasureWatch.dotm rundll32.exe File opened for modification \??\c:\program files\RestoreConvert.bmp rundll32.exe File opened for modification \??\c:\program files\CheckpointComplete.mp3 rundll32.exe File opened for modification \??\c:\program files\SetPing.emf rundll32.exe File opened for modification \??\c:\program files\UnpublishConvert.gif rundll32.exe File opened for modification \??\c:\program files\ApproveRestart.xps rundll32.exe File opened for modification \??\c:\program files\ExportUninstall.scf rundll32.exe File opened for modification \??\c:\program files\SuspendDisconnect.wmx rundll32.exe File opened for modification \??\c:\program files\UpdateRevoke.eprtx rundll32.exe File opened for modification \??\c:\program files\WaitJoin.clr rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3652 rundll32.exe 3652 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2584 wrote to memory of 3652 2584 rundll32.exe rundll32.exe PID 2584 wrote to memory of 3652 2584 rundll32.exe rundll32.exe PID 2584 wrote to memory of 3652 2584 rundll32.exe rundll32.exe PID 3652 wrote to memory of 1188 3652 rundll32.exe cmd.exe PID 3652 wrote to memory of 1188 3652 rundll32.exe cmd.exe PID 3652 wrote to memory of 1188 3652 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll,#12⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- System Location Discovery: System Language Discovery
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55cbf99568cf5d4f351a39b8895556941
SHA18f213eec6651e725e4a07c1dd2719aa9d5921223
SHA256c32d1a10be53091585ad7cdab7dce523f412ea5c824cefa13ff91ca1b332f49f
SHA512ad103b5d45fd8e6ed43aa22211a359f07f97efffe22914f3ece4fa44f19709cb72911c2fc3ae5a9706e6e5ed8551596b30f33eaf889edaabaf5d5fef9bdf6740