Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll
-
Size
116KB
-
MD5
d4b649fa835be5c08224c91ce20d8365
-
SHA1
85e111fdc51898b9057868f17a4a1496d00db689
-
SHA256
f74c7a605588db80b0812de54ae0f5bf26fcaef8e7dce830a64cbeaddbac7673
-
SHA512
62353357fa8f487502b7536fa5e4ac23d11116175d743f59a22eb05d10cf1a875d56f117a20afbc290037774b0d02be4c22b65675f442bc212eda1052b7735c7
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AuJ/Opu5Sn1WTBmrQ0z0U4iq8:8vnuGqfGOqVBuJ2BWTN0VqaZn
Malware Config
Extracted
C:\Users\0b0rqlzk13-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/824273BC99598056
http://decryptor.cc/824273BC99598056
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\L: rundll32.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification \??\c:\program files\NewClear.jpg rundll32.exe File opened for modification \??\c:\program files\RestartRegister.emf rundll32.exe File opened for modification \??\c:\program files\SubmitClose.mpeg rundll32.exe File opened for modification \??\c:\program files\TraceGroup.vst rundll32.exe File opened for modification \??\c:\program files\DisableGet.docm rundll32.exe File opened for modification \??\c:\program files\ConfirmWait.temp rundll32.exe File created \??\c:\program files (x86)\0b0rqlzk13-readme.txt rundll32.exe File opened for modification \??\c:\program files\DisconnectBlock.csv rundll32.exe File opened for modification \??\c:\program files\ResizeDisconnect.wmf rundll32.exe File created \??\c:\program files\0b0rqlzk13-readme.txt rundll32.exe File opened for modification \??\c:\program files\ResumeResize.contact rundll32.exe File opened for modification \??\c:\program files\WaitRequest.tmp rundll32.exe File opened for modification \??\c:\program files\ImportBackup.mpeg rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3096 rundll32.exe 3096 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3096 rundll32.exe Token: SeTakeOwnershipPrivilege 3096 rundll32.exe Token: SeBackupPrivilege 4732 vssvc.exe Token: SeRestorePrivilege 4732 vssvc.exe Token: SeAuditPrivilege 4732 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3096 1508 rundll32.exe 83 PID 1508 wrote to memory of 3096 1508 rundll32.exe 83 PID 1508 wrote to memory of 3096 1508 rundll32.exe 83 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4b649fa835be5c08224c91ce20d8365_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:260
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55af1d2322adea47d9f4f52e7afae3846
SHA179eaa124d68fd0a3f1d9e8403e7fffd1a006f249
SHA256588ae325e5f618f35f2533fe627d8a8f5a943e44a6b9dbe98db9c1770c55db55
SHA5126e0150c19b66805c92df89e49c04f3ea758672ee1b4728b6c646a16ee2c7cd88ab91683bbaac282ff10cc38d45917ba4dec7f4bcdae8e0284c7aabc25762829f