Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 19:03

General

  • Target

    d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll

  • Size

    161KB

  • MD5

    d04208e8499134779820f61c15d2ff37

  • SHA1

    56770b21d974922a42c6dc80e433490d1aba8624

  • SHA256

    d765650f9f566880df22f1dbabcd8da0dc81d6e10ffe3baee3166ac87ab12a91

  • SHA512

    4443dce1f06c9ab3843f50546f4d192e6cceeb483ec8d468574e6d555dc560e4abd7405d058e4d6f21601876f63c8146f167e6d25bd3e1a2c46d75bb4e416d70

  • SSDEEP

    3072:SrVv1LsjovMDkQjKiNLDIFjKbnSEYaQG8uVsR2q:SrRijAi2GIFGHYQ5yR

Malware Config

Extracted

Path

C:\Users\yrq54298z-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion yrq54298z. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20323DDB754EDD40 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/20323DDB754EDD40 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: +Tm0DFR3uZn4u186X6uwpErbIr2ncjuepbb2BI1qz0+CUU75kIq8c2zrx6NtIb2n nhEJBSfjVOyHKxgdaC9pTAUVCtct81eT9ei/amOjuC6zQvxsBFPuDP+RV6rnFIBB Lp/p2NlQic7HKD1ecreCs599e0MIQ0KiEIl3b7Za67JQLrHoEhuKmnY9wKtjf5G9 oVj20tMQu9dPxM26n642cMIDXWN+pfPloJsJ713lRG9t1b5rUDOG1A72ghgqQFKJ YYePRDDaeasalIc+tdx88pDBKqGzL09IWPobKPIVg6gtaXPxXIGv+hfE2Fbb2HQf qn3WU3DGt/inQ4TJVWRYfKbgz93rpMe6YkqjUSvdXO4hDrCRlFI12ghoJeSGVQsh jxj7tzaUT/t0BmfVfBmTejT1SXguOn8QD+Pxi4hav4vqu1LhZS7ei0RFE+IjjBiD dEFFRBVyUqg439pihpNq7RgpuLgG+CiumQD6kwu3MOD5Vpld995cMCG9N+XT3HrV 7SzF+SxptcVDk37pdZPGBwA871K+FN6j8Jt/ArEtZ2IHYo2XnmXna5qB1pv0qMfA yVcufP8t/29qumBhCbI3fpXI6LBDrukXbDsiLuLHuOylLeH+cJxoXmB3tgSP8qtU mcd/dI/N119zQ+qaPAHmKctq5RnQARSom9TfDOtoQa0sg0z2h5yTVritCyr7qm0k T76nXYFuVlPzVc+TMEQmwHDpcAkNXS1p7a/zgRDk5v/ccLX8hanGzkMEfGOS9+Rs XFiRiT2B67FMKCRvN1xMXCZ7p6GCZCrIzmnsEX97zL8KR/TzcThfcBjclihq6FqH AujP09ijSuI5kHjzeQWfT451rXsrBACaIAm2l6WsjONJqoWCGuzuz3cRAW1/BbmF ymmc9amfeB/6bhvl3qu+FzzDMlYth6SQ2xHFCZsy0TtT+ZNjyp9m6Jrnz/+mFtsI gntmdquC2iG2x36ZnO+0V6v3RnoXM8NC+VnYZSKUrvVQjh+wxRFLnbArg1spLn6C okcl8r8luhkaXxao5M1hnpzKLrOBqTQoXl2MtVM4S9//6iSqHY5uyE+aiKLmvC3D Y0CYihVo7eAo8SHuicnABRWeFOKlL+4tj9rS0pcoybKKXXLQDs0cZ9yhDJK08tMh 7zERHENxdhUY2LHSA+nOXTj19c+6p+KMFt2/Nd2NsTuW+TSuhRdIR3vQeBv1YfUc qqXbBYSZHdIG4erRS8cXvTNKmzk= Extension name: yrq54298z ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/20323DDB754EDD40

http://decryptor.top/20323DDB754EDD40

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d04208e8499134779820f61c15d2ff37_JaffaCakes118.dll,#1
      2⤵
      • Checks computer location settings
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\yrq54298z-readme.txt

    Filesize

    6KB

    MD5

    5cbf99568cf5d4f351a39b8895556941

    SHA1

    8f213eec6651e725e4a07c1dd2719aa9d5921223

    SHA256

    c32d1a10be53091585ad7cdab7dce523f412ea5c824cefa13ff91ca1b332f49f

    SHA512

    ad103b5d45fd8e6ed43aa22211a359f07f97efffe22914f3ece4fa44f19709cb72911c2fc3ae5a9706e6e5ed8551596b30f33eaf889edaabaf5d5fef9bdf6740