Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 05:52

General

  • Target

    e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe

  • Size

    157KB

  • MD5

    e62c896825a6d186f34fb16b1f57490a

  • SHA1

    3287ff1b9d6256bcd31567c97e90a9bc89cd4f2d

  • SHA256

    08542ea965f7ac97c90635444860c5d35a8e8e81c7edf3ddbf6c1736a8c61b63

  • SHA512

    1c8e60da15ce4dacfc4f4a8fe3c90c3f37034a1333198e834c6924a15b35afb215dbf77361d3547cc254c16e3c8d289df639d174f569d0389307906cc3c3e7ab

  • SSDEEP

    1536:LWlo4vFAPi8hnuy8Ey7pAe3U7Pbi4eTMluxtXDCntTnICS4A33eKWKOgwoAN61Vj:Fi8Iy8EytSLbi4eTMlwDCnuZ3N9w0IE

Malware Config

Extracted

Path

C:\Users\Default\s35351-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion s35351. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3E9BE02DE900A378 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/3E9BE02DE900A378 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 978AC/e1b9pc7WPy3EkURkFVI5uadjW3ezxohg4lhyyVIBgQF1yI9gpnR3dVPKQ+ UvdvJ4CqS3JGgJLrSljZxfSlOjOYZc1eFp7WhNdyFTcWYEBwJxAjbioXDJXTtXhB JheS0OY8ZSdi+x/IHmhe/rDEH94dCdLI2+tv5gG+s9D/WFJ9lrIR9wT5fmhqg0Lw Mn5OSbWdj2ZLAhawgeV3hpUkhGpwHBOo0/55sRlqSB7480dJa6TqVWeNmsqdEtkz wCjXOh+m0ZOcBQ1lUQ1NcKvOE/RGx98S5YcTfz9pAIs1taNnQUbdpPmgdm57D49P 0HIwvJPBZTtHlU4FkHGIqVmQV0Cq8OXzxJQMnMKxDE0HQ/yvLLe/t+RIZhrYgR4e EZ24upIw+DyyOILRKjDvi84i9nrPrSo7Z+obRCTMbWGk42cBD2Ta6rk4pNwESNNE rp3fYQyaqhB35BKKXHp0MOuLLpPdkW04nm2jWUt2Raq26YSc2uIecRX0S2wFM8JA ngLNf/exQJwODofQ3932wqq1WxUTGecsjhBkltILoAccuOhNBTRnAxhu+/ujZNYD nYotLjQg0UPo3+y3qkTBOq+2udsKqJqWuJENLSVHmtjpabBLdOI1SbeZc9YJmgSA JvnRyboyslRGnGZKMOCEQUIW5NYZ+C/2bqBPqD5t2DG467umTnw6g9odjvNZ54tg q4lKEicKBTCXd/HG+K9us9xNe+GFBN5Q0C3kxmqsnvroin9stdZM9X+U9R/Jc88F 90LSxug/Vs5SuTESzKMFS8JAB8qFehb8xqCC7V5AvLCyAkcP6Lp22p+57Po+iomE WPU7xMe+t/1IfqaWwslUpsiLvxy/DQngdIS9X+0vVmb8EhjKdPujv+jCiiGDXBQp khyiojkEgYPoNXaXB3CaycDGiw15sS2OE8vNwiQbOjgC9NYQlFfwEVRvWlzCLCq/ B0gMet8LMQhkx1TpbavbObl5hB54xTiJOa3POYJPamvHMufC8kC5IhdbK373rhM5 bFwuSCUeo0KJOSvudyqqerhTC8PvaGf0JDdVjccLnFKf2fFDe+zIGcoclx0qjN3z ikC9vq59uK5QvJkXWDdfCsLK5ZIRMSYrBv/1MSqxLNo1O2jTdmESt9cljcMbSXFO JtvjLyNAp1+1Q25vTIGmgyYJcGFR2TbCK+ZtPO9xzi4= Extension name: s35351 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3E9BE02DE900A378

http://decryptor.top/3E9BE02DE900A378

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Renames multiple (162) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e62c896825a6d186f34fb16b1f57490a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Default\s35351-readme.txt

    Filesize

    6KB

    MD5

    1a19dd7aba25e94e7900706c0bce42ab

    SHA1

    4fec96a19ea621c3d51c9ffe0fe2e56229aad608

    SHA256

    d57d01c18d51bf38a2dc8c7b0ca4a375635312d70d126fccf9ebba88d2068f82

    SHA512

    03114c9ac82ec75e5bb7017fdba657cdd8aaa151d9095a5ee1833fc04d499788e1a470877457dcae47631bd163cd6fd800691542ae8f033e3f75f5227bd35c17