Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 05:52

General

  • Target

    e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe

  • Size

    157KB

  • MD5

    e62c896825a6d186f34fb16b1f57490a

  • SHA1

    3287ff1b9d6256bcd31567c97e90a9bc89cd4f2d

  • SHA256

    08542ea965f7ac97c90635444860c5d35a8e8e81c7edf3ddbf6c1736a8c61b63

  • SHA512

    1c8e60da15ce4dacfc4f4a8fe3c90c3f37034a1333198e834c6924a15b35afb215dbf77361d3547cc254c16e3c8d289df639d174f569d0389307906cc3c3e7ab

  • SSDEEP

    1536:LWlo4vFAPi8hnuy8Ey7pAe3U7Pbi4eTMluxtXDCntTnICS4A33eKWKOgwoAN61Vj:Fi8Iy8EytSLbi4eTMlwDCnuZ3N9w0IE

Malware Config

Extracted

Path

C:\Users\Default\70aq3vd-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 70aq3vd. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8F6162888EE7A841 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/8F6162888EE7A841 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 2nYmhUE0KX5AKkrR4mOOKWqg8qoqUAX4PttFqQS69ZfCirTPFO+ACH1s/MI6TiP9 THLuF+KHL6LuLvbkZXu0UboIPq1BcyuyrNISXIPkWY8ZfANk8Ah0EGWslnMPiDNi 5NdBu92XtwH7DX/Ui1RmhpHgcLsnH3VV0RBKjQpYBIueVo1DG1GP7dQ4PTyvn0yE yo2swDPkqnZ5RWQKCmmn6aM9noiyKwvA6nYnch1LDm+5OewW3CJKcRAPWJoBBO7z nqbTmAEiSX2Aw35GZZE1USdxy4VISfHNYlxibmlntERPj4UmiG3okFvBzYnE/M/V j3NHbuke0q30MvB2SRzPNrI92XKMfzMLyzBGJGqejZUYe5CgLoVpviEn9gnRxmga iiluOYV5bl13oniZ7MvDdn+Klw9EYp/9gKutg6/WB24ib6BUkVAlNkOHiQJVqX7S b3xNDY11/8oOsMzUP3IG6nd3szl5MxMvhjN3FAxCuhwQN3iQCdjHg9+a2Yin/SaS nvnPQTip7E1BD2VkeRU+JtKzP3eeI3K4jZtw8a/Rn51EIkpXq7tnhODfJ51qRWXK eEyfdBOO6R2x/SpOacQLRfO4xGwvnaCsj7pzZJZmB+KGV3vwGKLYutTK1CjlpQYB +NlAzQcAZISe3g2zVMYIwuaeI9qJ+w2oew+lqrlUlbnEDMJJuhdoDFkUEaFoXus5 6oXs2MJ8syHO8rB01FrJCB08PqSqz321Vn80KmaeUduxXuY+ZDLlMezXmi0xan6c VAqKY6RO1DfChkz/yV0VNe7WiKF09lBsljs42ASjdfnxRNDSBNez68CZ858VYOow R3g7M9qniM9ZVH/DpJAxOM3QrLcuIwKe8xLagMkb1OIOUJUxwnzAhRtBice1OWs4 u+8lt68lW2sifcqQa8PIln8BFM1k1Ovw2eP4cThOrS41FRcBsUYpxEYZG34/3okb nwu40IxdqKciY0TP9rKjTKGy5Z+pbtoygq3Dvzy39daUMxBG0lGQW4Lbptjg5HfG rXRQPEXAnJF5cwlJ91X4EPQYWp3GCSHPvW5nX5jfoNkVzphvWpIyMH3f0l87H3e0 w249TKbPSdV36iMQS8XRyrrNaO353PldLEbzxMNzGccWJFf3LCp1hXkETbvGG/Ai zd9+vRg8yHklulNLWJeu47Eu/BblYkGah2E= Extension name: 70aq3vd ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8F6162888EE7A841

http://decryptor.top/8F6162888EE7A841

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (188) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • System Location Discovery: System Language Discovery
        • Interacts with shadow copies
        PID:1680
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Default\70aq3vd-readme.txt

    Filesize

    6KB

    MD5

    8d6a9bad438f5b92bec0d08a33363b01

    SHA1

    ef51ad996aea846bda2aeed696bacdd39e5c5017

    SHA256

    7cd1545bdcadf212aa7288bf479ce6d73b96bc6d1d1d6f572b0b9c5ab5645497

    SHA512

    da08b50898ce5dd7454b515497578329bf250f6c853969a270854307498a4ea92b75bbe3bf26ed747cea68081d42c5802dddc5480750eb1f70ef7dd17c0dcd70