Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 06:27

General

  • Target

    e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    e882b3bcda9db4042ee8dee6473523ab

  • SHA1

    3e47eee25cc560ce89a8b008de69eb2a3e4bef8f

  • SHA256

    9dce03d33e8ae4b25d93554dc675fe7d2ea68b5fef6167c533bb92e3d38b2696

  • SHA512

    1d2b3ea2fad4de43f54c47208ea23bb7eb5bab1ac3b6d5fc6f3e49b4ff699b1dcdb9cfed69f1d271ab44531a29b6402f715df2ca9cb8382747431d5bfceec71f

  • SSDEEP

    3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NajesXR+hyzozm:lw02sJPi7O93NQc

Malware Config

Extracted

Path

C:\Users\lp14h2577n-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Globalconnect. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension lp14h2577n. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64EEF8875A215BF7 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/64EEF8875A215BF7 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: q0FdUbxvxSWvPzupn/gvGfiqtIU3JcdCaOk1wSaXrvrVI7WHSa3gWzWtMcq6Qvqb Rn1LjBckicoa0wCQio2YIRaMNX1diuoxli5yJ2gWWFYc50VGtl5/+GcVH7SsB5m3 0KvZj+D416n4LGcYCNwonEMupTtMIzwhJaZHx40Rfm7ZfI2yCa6/AM2kaNxQFUQe lqynqBCo80leS/C4r/CWVjf3nl+4dMqozzvObMaUdIXktyGjRV4tn1NO5NTlt6o4 Z69Mgjd9y7tmGBCOJQlQKblmX5vTAEHpMGH87K0eJ5mIoFJ0aYQJSPOktmHSjJCx ee7JVC/2vm+vSO3V3XgUYp5TX/VGayuF8IdveeGLhFQfJN8Xs5XcUESDfBs4sbDe 1P8lfi3EVXqvipi8LDiRJIdtx1Ax3XRtiK0qDH05jmDaC7CDY2zhShU83/OZsoxX JvG9z3a46N+S5hVVFCFh/n8mg3g3ttxDTeMQlv3ggkqDAchi4zpFugmN4lajRzMI jz7bb6TFau0EvRboiCG2OUQUuQrBmbAf5MBcq2AnewsDv50SmJkPdMy6bFOiH6mA 3d7zcsFElgpvfKbhoHQCB+i68AOK6TcUotVxseITfpq7xA1+a1yecg7DgPpcnXCS PGZXSnGcm8tlti5gGsbEdpCOCwpeq3N+X0xXP9sfxY/0BchTPVGKdfMabmL1ZXlA qKraqrd7pVQuQQW99r0VHkGGCAzYPt5d7vKoElUlH1ovNVVApcLonRaTMnoG3x4z K2rqTQoE4fZs1BFZySqZfwadY5KTyyR17EqKZhlmNzGT1tuVlQl+jGyvv07g8L8u TXNx/+yogJ0035JZphhZpUvhofgWepwrRMmeQCvVJsQtsiBHYr+dKpZOTCdKp+NZ 6OOE4Q/fhPoOdqOAjKmuxmpa/cXdmZbvX6Jrl4UiemZrwoXRGzrqEdO3DpUtmTD1 cGz3yIkjXB1LAWlRg9YNlHuOrbG2SRsG9+K51GjmsXUeP7Gr2CCeOivEVzpesSYc 2b1kw8HwztJyM9EiEzpkZ7Rh/iExQXxFvoW7A6XDva/DMKzXepBvILczEAuXSZEP ziFsl4hBrR8uqlGJMafvEUI6CC0nk72wsWVo9TOG27UiQD0DMjRpuZjiyDxV8YGW K+tmBpanljIm0xIHmJUB6ObAToGQs9OJ3NvO6SXRxF7fbxjRv5V8bIOJSfc1Lk8s cZtb6sMHo3pY90++TxVrin1vbGg= Extension name: lp14h2577n ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/64EEF8875A215BF7

http://decryptor.top/64EEF8875A215BF7

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 41 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2912
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2896
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\lp14h2577n-readme.txt

      Filesize

      6KB

      MD5

      960df161b497b5fb12e1207447486361

      SHA1

      e639c9950ebd96a45776ba28df7db4bf57f96f46

      SHA256

      73c50d0bddce35634e3ffb2703a5497a84738145d271cd0eb24ef84bf85a77fa

      SHA512

      ffd90a6cbaffd23a8d171eebb2cd790f80b2efdae3f3333aca1e604f19c6821a69e98b1fac92fc0c7673f69e5bc88c8830efd518e6fef8f13151bfe323120144

    • \??\PIPE\srvsvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • memory/2912-4-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

      Filesize

      4KB

    • memory/2912-5-0x000000001B720000-0x000000001BA02000-memory.dmp

      Filesize

      2.9MB

    • memory/2912-6-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

      Filesize

      32KB

    • memory/2912-8-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB

    • memory/2912-7-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB

    • memory/2912-9-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB