Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 15:49

General

  • Target

    d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    d4b649fa835be5c08224c91ce20d8365

  • SHA1

    85e111fdc51898b9057868f17a4a1496d00db689

  • SHA256

    f74c7a605588db80b0812de54ae0f5bf26fcaef8e7dce830a64cbeaddbac7673

  • SHA512

    62353357fa8f487502b7536fa5e4ac23d11116175d743f59a22eb05d10cf1a875d56f117a20afbc290037774b0d02be4c22b65675f442bc212eda1052b7735c7

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AuJ/Opu5Sn1WTBmrQ0z0U4iq8:8vnuGqfGOqVBuJ2BWTN0VqaZn

Malware Config

Extracted

Path

C:\Users\q64yx8at-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension q64yx8at. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/361B213EB262C399 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/361B213EB262C399 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: NSd1J9FnBCOS6uoV9PJXyHxb1VPcPdubX35FANfqYFWAu/08v+mslgoTh63qonL0 h7lUhbLKWp/ySqbKL4eNTYasq7rewtvLBvwC8blmxImEo56yLwBW8bFg2HKVh6Qh r+za87I0raGneKiOcV4Q7PRDsd4U9sgADdTrIB8uN+3xA8WdvDg2Yeq+oqlrbVJ0 IguzI4V00PZGNaDg4JJmjK+fcTwIFDddyyRJZ/8vqGTmVoQy6icAcjELeMUFasId xPM9R8paR0QBUj48KgPC8sYaxiTk5W6ZP22iHTK7QrHSAYkLq9TrohfrHU4RofF8 lRajWw1fgOU1KAOMCci7iPRKcH88DsEkDyOiIfiLPI9oQLCN+JFFCAzFUvHxpxfv qxLtlJZpv0fUxEZpntw1Uphs0kGzBhVRi1ShjKmYob1tFlTw7gFY6QWyzaFV/4b0 PUL5s7HY13PKH8OH+gdZnHrWXnSUrxcAk3fgRGn+QVXRULuT4DupXVtqR32BjPP5 7jXsZHBrVP3pvttthS8JdzPbSevtV8f9VrHzbWx7hiLXiB4LXLic3umFTJ8WELso bk8E7y7WTLmFJjr3RWtvfNdba3Ymiioj90CW+XEgKtVeZcfAi0zPlHxkYao/4qI2 4lNLoyzKYuuohP6wHKrDC853L90htNq1W3bxO9hGxRndZ639loQdWPNJb7WaxOlI 2YGN+KE53Kv1xTK0OlsaRIhoB9qyBPUIvV6GmFV4AVWulCJ+8ZwRXlmemvhtKykZ 6ioV8/gRyzG8MSixRKwMYBcDh609jYd+dKiatDhWrBEv+nw+5f/5UvJhlfLE7lb+ O38UJucdFgclOGpKWQlFcen+OEYAPCWxE7OpJHg2JRDDYMQ/kwlcbyzuqxIwruRE 2queYFEsHkH0DHR+YM+1unA364tnIi+lBl0VyNmsTn0jftiOY39V9fc+HDy2fXzx jCL/Her2tlzHsrhsCkI+8FOGP027fKuFXQSX1BnC9LLDQVzj05yxLPgDmkGBR1+8 UVO3XmOyX2I4XubbTMdUJCEmabGPfVY7mL0wT3Iw4QwfkQLZqMlThPX2MPTZI5G9 tFubz/VhQCRlLttLNtZJCqm00rMNqZtyNnJuQMel40vSi5+BgHeK4R3xfPIydUWl H1pIWIyoJt3qDMS8qVPcACfGG3HWBoe7/zUEEhVoege/ErdTTivmjIOj2O/q2Npo rzDuwJUNCMLHRr32Svi+gV4wuidHx28IZiStcmSTDzi93qdJ/9Ndd3XJkuXzkvgj /uBOMPjhhN50wB6z/1oo+hxa5WDtPvfKZJgdvDrYDXEkcn9w6g6D4MWOxrznGORU TxDeGgJ1Onb2Km2atUB/JqDN8jeEZvcnHdYziKXywzM8Ea+d ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/361B213EB262C399

http://decryptor.cc/361B213EB262C399

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 37 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2568
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\q64yx8at-readme.txt

    Filesize

    6KB

    MD5

    5e04b0807bf3c848a89e77d1d7b08421

    SHA1

    d2d26569ca423d00dc4d0cf4034e65dbc86d3e82

    SHA256

    1565649c4d21acbaf84479951141e33e0ff36f75317fd40b075dbf1110972aa6

    SHA512

    47bca4a60f04c5860fc89169339631437eb2ebf48b935dd22b5aa7ec733404b77c8f3efe6f87e02885df4824f33e6a5e96e493773428ed7eca6d3214d8124970