Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 00:46
Behavioral task
behavioral1
Sample
e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe
-
Size
164KB
-
MD5
e15f1d0621564f7cd294b252c11d91c1
-
SHA1
cb78aa749f30ba640418e77e72ca9cedd1220ddf
-
SHA256
dbfe1b859321098ba278b692ed6c0685ffcdd2e1c7c4f7289f0db09a5db6dc6c
-
SHA512
d64d4e4db816d1a77e2f6938f1285f043e14143a338224132117105d105faadb4295d2aad8e56e776ee2981259ba20196226ad730eb0f10da87c74500ecea39a
-
SSDEEP
3072:70XoUeZ/DVS8L7flcMTeYWikGLvFf9avGOq:7eoUeZRlcYxWYTFf90G
Malware Config
Extracted
C:\Users\hvc5rtiqd-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7680D3FC965F6BF7
http://decryptor.top/7680D3FC965F6BF7
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dWCJzZNzru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe" e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\K: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\N: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\W: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\F: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\H: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\Q: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\E: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\J: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\O: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\P: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\Z: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\A: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\D: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\M: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\U: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\V: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\Y: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\B: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\R: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\T: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\X: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\G: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\L: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened (read-only) \??\S: e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kj4i.bmp" e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\program files\ResizeEdit.wmf e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\SendUnpublish.mp2 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File created \??\c:\program files\hvc5rtiqd-readme.txt e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\HidePop.easmx e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertRequest.aif e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\TestMove.pps e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\InstallSplit.mp3 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\MeasureRedo.png e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeDebug.scf e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\OptimizeExport.vbe e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\PushProtect.M2T e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\ShowSet.m3u e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\AddEnter.3g2 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\CompareEdit.mhtml e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\UninstallPing.pub e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\SyncComplete.vstm e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\TraceSync.pdf e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearLock.pptm e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\UndoSave.vstm e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File created \??\c:\program files (x86)\hvc5rtiqd-readme.txt e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe File opened for modification \??\c:\program files\AddLock.nfo e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\36DF3F8F7059107450B963CC39877D4CA443A0DB e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\36DF3F8F7059107450B963CC39877D4CA443A0DB\Blob = 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 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4520 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe 4520 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe 4628 powershell.exe 4628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4520 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe Token: SeDebugPrivilege 4628 powershell.exe Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4628 4520 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe 89 PID 4520 wrote to memory of 4628 4520 e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e15f1d0621564f7cd294b252c11d91c1_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:216
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD52bc81829467bada9bedcf28b80d0860a
SHA173f14e65ac0f5386cc5946482aa2be0d30f47d08
SHA2560c0f2b5c70069e9951791a70e59ea3293e2cce1e731003855eaece6988a3ad3f
SHA512ca92b9eae464620c3d37da246ec14c0e7896e4da8a2d31d1fe02586dbeacc896c894ad3f9b6dc881cd8597123e241173cc9eac9066ab5d932e919fa85f075d9a