Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
-
Size
116KB
-
MD5
d4b649fa835be5c08224c91ce20d8365
-
SHA1
85e111fdc51898b9057868f17a4a1496d00db689
-
SHA256
f74c7a605588db80b0812de54ae0f5bf26fcaef8e7dce830a64cbeaddbac7673
-
SHA512
62353357fa8f487502b7536fa5e4ac23d11116175d743f59a22eb05d10cf1a875d56f117a20afbc290037774b0d02be4c22b65675f442bc212eda1052b7735c7
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AuJ/Opu5Sn1WTBmrQ0z0U4iq8:8vnuGqfGOqVBuJ2BWTN0VqaZn
Malware Config
Extracted
C:\Users\q64yx8at-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/361B213EB262C399
http://decryptor.cc/361B213EB262C399
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\X: rundll32.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification \??\c:\program files\EnableUse.svgz rundll32.exe File opened for modification \??\c:\program files\OpenPing.vsdm rundll32.exe File opened for modification \??\c:\program files\StartUnprotect.3g2 rundll32.exe File opened for modification \??\c:\program files\UnblockUndo.clr rundll32.exe File opened for modification \??\c:\program files\MergeRedo.emf rundll32.exe File opened for modification \??\c:\program files\PushProtect.xht rundll32.exe File opened for modification \??\c:\program files\ResolveProtect.ex_ rundll32.exe File opened for modification \??\c:\program files\JoinInstall.docx rundll32.exe File opened for modification \??\c:\program files\OpenOut.temp rundll32.exe File opened for modification \??\c:\program files\OutResume.png rundll32.exe File opened for modification \??\c:\program files\UseConfirm.pcx rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\q64yx8at-readme.txt rundll32.exe File created \??\c:\program files\q64yx8at-readme.txt rundll32.exe File opened for modification \??\c:\program files\BackupSet.inf rundll32.exe File opened for modification \??\c:\program files\EnableResolve.rle rundll32.exe File opened for modification \??\c:\program files\InitializePop.mp4 rundll32.exe File opened for modification \??\c:\program files\LockGet.gif rundll32.exe File opened for modification \??\c:\program files\RegisterCompress.search-ms rundll32.exe File opened for modification \??\c:\program files\SaveDisable.midi rundll32.exe File opened for modification \??\c:\program files\StepRevoke.search-ms rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\q64yx8at-readme.txt rundll32.exe File created \??\c:\program files (x86)\q64yx8at-readme.txt rundll32.exe File opened for modification \??\c:\program files\MountUnlock.vstm rundll32.exe File opened for modification \??\c:\program files\RequestCopy.avi rundll32.exe File opened for modification \??\c:\program files\UnblockRedo.contact rundll32.exe File opened for modification \??\c:\program files\CopyRepair.vdx rundll32.exe File opened for modification \??\c:\program files\ExitPublish.vbe rundll32.exe File opened for modification \??\c:\program files\WriteSet.ppt rundll32.exe File opened for modification \??\c:\program files\ApproveSuspend.jpeg rundll32.exe File opened for modification \??\c:\program files\MountRepair.xsl rundll32.exe File opened for modification \??\c:\program files\MoveStep.wma rundll32.exe File opened for modification \??\c:\program files\ResetHide.jpeg rundll32.exe File opened for modification \??\c:\program files\SplitEnable.jpg rundll32.exe File opened for modification \??\c:\program files\StartResume.otf rundll32.exe File opened for modification \??\c:\program files\FindBlock.edrwx rundll32.exe File opened for modification \??\c:\program files\PushWrite.vst rundll32.exe File opened for modification \??\c:\program files\UpdateBackup.txt rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2568 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2568 rundll32.exe Token: SeTakeOwnershipPrivilege 2568 rundll32.exe Token: SeBackupPrivilege 2696 vssvc.exe Token: SeRestorePrivilege 2696 vssvc.exe Token: SeAuditPrivilege 2696 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 PID 2368 wrote to memory of 2568 2368 rundll32.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55e04b0807bf3c848a89e77d1d7b08421
SHA1d2d26569ca423d00dc4d0cf4034e65dbc86d3e82
SHA2561565649c4d21acbaf84479951141e33e0ff36f75317fd40b075dbf1110972aa6
SHA51247bca4a60f04c5860fc89169339631437eb2ebf48b935dd22b5aa7ec733404b77c8f3efe6f87e02885df4824f33e6a5e96e493773428ed7eca6d3214d8124970