Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 15:49

General

  • Target

    d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    d4b649fa835be5c08224c91ce20d8365

  • SHA1

    85e111fdc51898b9057868f17a4a1496d00db689

  • SHA256

    f74c7a605588db80b0812de54ae0f5bf26fcaef8e7dce830a64cbeaddbac7673

  • SHA512

    62353357fa8f487502b7536fa5e4ac23d11116175d743f59a22eb05d10cf1a875d56f117a20afbc290037774b0d02be4c22b65675f442bc212eda1052b7735c7

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AuJ/Opu5Sn1WTBmrQ0z0U4iq8:8vnuGqfGOqVBuJ2BWTN0VqaZn

Malware Config

Extracted

Path

C:\Users\0b0rqlzk13-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 0b0rqlzk13. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/824273BC99598056 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/824273BC99598056 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: PTt5mVJgxeudu9BeeOfzOVf7raCOTnHh4LUcP1wyld93frHpbXcPcic0W23Dz2e7 qZL6M2/NPyh49Mou8VNR+54pcNUs2RoTN+ePs58e9EvBqJdvdaogcR+9JM/Ji+FR 3Bbm2JvdHOBdoESrRGHlXtfgfjdFLEETywVmMk1ia599EbUYlO8aIMPJD5F3OtaX 3btXkAtUnGsF3ul9JU3lQrQli/bBGlOA2PJSI4Bsa7Hn0eY2lv3PGcQD5M2NX+J8 qZkc4l55u4vljE1FaagEymVdu0ateBo8RbF8BtUQKFstHLxevctEXFiDniAG0zth 8UoVTyYvHQzi8NasMTj0NtfJgYpub1kVv81r7O8rQf5OZ2U9MprFjLB8e2f7zj1z 6cQyJWQKt2LKS0iIYuUI6YVQqa2gcp9CyXw2ir/YHcFyXpBS5aWt+NHOrGBLjxDK FbWqipe3Qy7IOzff8uHePPx0rPKM9UjvgAQIlrpvPX1juyGIjWSU1jemp6xSR7hl R8ihQR5rSO9ub1vLhBlie97xk7cPqayA35Ngsv1Zv+4t5sA9ZsMP4B3VfRHYZgMX uMH6uYHHF98vlsCTaosSxRJEEzLeL4S7z8mujwvN0NMduBIeDtH2lsVt2c88Knrg dF+5kwXFZ14BqPfbMP/mGRpabLrX2ClXVGH1c06IGbyfP1prwN4E7tRBqtn2g8Se v1wbk97pImaiSGWqXYFHtd4loGhG7PeVuL83X0dUmflXbj+uATHCrfj/TwdvLxl2 kIytMgt3uA/+KxTKr2RIg3sVbhywBrBOX/1ev3H6Bs4Dip7oAm09xEv856+pro9Y cwooPS/29vH6VTshXGIqQqEhdwe3PLXZH6C0baG2oRclxaQomNT68MBlITXOXoXI 3qvXDqvQ6ovddQuatDckXmBr2zYLjAHHxMW3sdlivjnazYBcAX8Q/Kf99Lg798SO Yb1xGU+2Sntgb+6P6mw2mBNehwter0aMmYsxhn2pv5iZ2gp9T1Z3ReewIUzIWEIh ShyRaVyPZplmLRj7/v9RCmz1p1PsSwBOdL0yCVBMGSwaa1fuPMw79CjLvKhOx690 XJmOoi6VYuhlHpayBhldxLMabpRwFOD0ucAy/HmUp8b9wURuvC3xB/as/6axInJl OPBrhR3Cj2RJ/dKNMi53phTYSFxKK7SLmerZ9X5ORS2rDoEGvZrGo/SgulaArTpN GdZD66xubLKAjcllo6oi7uCvVjPvv4q7nxef91gNZGCaGrIBj6+KEBew/BHJCeUV sXfjnqhgrVaeQ7VLdFKSELkmTuTXiaVRk1RTD7X3Vm2PQbtJEFQdS+tWG4tYlO2Q DBkvlqfx7BaCf6LrVLn0HFqUQ2KFtT/Jnwbw8MWfw6TLFAwRRjQq4CwywF7urw== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/824273BC99598056

http://decryptor.cc/824273BC99598056

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3096
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:260
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\0b0rqlzk13-readme.txt

      Filesize

      6KB

      MD5

      5af1d2322adea47d9f4f52e7afae3846

      SHA1

      79eaa124d68fd0a3f1d9e8403e7fffd1a006f249

      SHA256

      588ae325e5f618f35f2533fe627d8a8f5a943e44a6b9dbe98db9c1770c55db55

      SHA512

      6e0150c19b66805c92df89e49c04f3ea758672ee1b4728b6c646a16ee2c7cd88ab91683bbaac282ff10cc38d45917ba4dec7f4bcdae8e0284c7aabc25762829f