Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 06:27

General

  • Target

    e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    e882b3bcda9db4042ee8dee6473523ab

  • SHA1

    3e47eee25cc560ce89a8b008de69eb2a3e4bef8f

  • SHA256

    9dce03d33e8ae4b25d93554dc675fe7d2ea68b5fef6167c533bb92e3d38b2696

  • SHA512

    1d2b3ea2fad4de43f54c47208ea23bb7eb5bab1ac3b6d5fc6f3e49b4ff699b1dcdb9cfed69f1d271ab44531a29b6402f715df2ca9cb8382747431d5bfceec71f

  • SSDEEP

    3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NajesXR+hyzozm:lw02sJPi7O93NQc

Malware Config

Extracted

Path

C:\Users\o76a63w-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Globalconnect. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension o76a63w. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8995BCFDBE850D96 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/8995BCFDBE850D96 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 8w9t4n2LA1kDXyZm28eA/N7gMfK9qRvC+aE6SkL3O9K4sjEFAQw0V1YxrZEFHEPk kTNbB3mBGHuMD4G1Q1sp0Uz3MJ2fo7/t9pXvCgyReZIfOSKxz6QQKgiHUE0Ai585 3iwDICk9pERBuWBytay4ULJy4sNAILoVEmdB6+kltrZr+0gpLG04SlmvBqCmETab 2BGOwlKk6ZrLWJy+Qsgop/RXyxRRj12j3azSyZZFlfUL9V1y3QxSohglqST7jCoV a4DPCaZbwaTU0kBluaen+4xzjl/V3ym4Jld2TbgwHCe/UceiOm0OFfh+mSzHrt9O 34OeZHCizwqM0gBYmRTg347bzeDDjt71EdkhgFr9s3c/l9cE7K5aPt4SQ0Hhc6O4 nICFZGYSggsMaYMebJGQuq9ILJlt+HNM8OmNi2h3NynKbuFPcRpBOLJXkN+Of6kN aSNt4ibvAgDIdPNhH7AG1Wl2zMcKZ6Z+I8zX5yoiPlAnjuDb1nDPgG+CRgcuu10y 7zQpLS49Rn9018TKQn1Bc2TymIZrmF8+zHbC7cex2iSXjpDq4fVRyrfagYCxK8WS ixtC2sodyzXplzwMpozo2dRV/tx7+rR7dgZWTzUuqKi1BkSI6zy7gBymcE6bATnK meuoNztMioFEqQkcS51WEhtcwxw5elgxMTj5xHVeJatc8vxRxrmxn1vNtX1Vlpoe 61d8FK2/AoAffoD5PNDgsJRHkFgKBuZ8eo7PGHJV3+tmJTk//lXfB5ai7xx/pu5+ dTfNdv7bGrFz6nxTjMEvK5zGfYQofoHMMALTOgFmGsES/wjXL+q16oxTgbMt/wtG XzfyJpec94zl5x9iVJfFEHWomuUnQIVkrqVAcfZXwr8ZtJGvXl85kjOxqRX01cFm Y+VIcHrz1pVsWhZ6nsxaUjzqLD74mWZJSvoTP4mDV76sF3VgPkdNo6CcTURqc74C xl4819iaAPiAlfTXIgrEgaSitZn8xUADmfBdIDoKgRWMwUZ0AgKOvqDQ3KMpd7ZH FMe8ZvPlUVt22JrWkpNXFBtA8NGTmyHX8WJxJCqvN7IAyOj5na7GLzle4gMS36k7 NRSNV4liyupx0PouKPokM64xG0AWBhoJlM7p989vF/62klLP1z2YisEf83MKFQiH +fw0NVB3FjsdHmiRWKwKqpdVOHd8qUNcIYx8tIY42f2ww9eoH8e5Vy2C8hBrHFJa h+KjFNswEk46v1xeTysjO1tbPK4= Extension name: o76a63w ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8995BCFDBE850D96

http://decryptor.top/8995BCFDBE850D96

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e882b3bcda9db4042ee8dee6473523ab_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4988
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:864
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vqy3y2zk.rp2.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\o76a63w-readme.txt

      Filesize

      6KB

      MD5

      91f14d118ce65f0ee62a39da1b28f0c8

      SHA1

      af90dfceb83291a564f6d0a4777c16b59f6c7123

      SHA256

      ec5545d2c1b238e9e725434f26e57fdc4c54ebea6f3a17b655e7fac911b2e32b

      SHA512

      9581e1ed35322a281d99aedc84afd4de85754b006dd6925b1daaa96c55c1be2a3a8f73c7af0ca300baf3d5e296cacba9821adfa65ddf79e96159f40364b405f3

    • memory/4988-0-0x00007FF8FA173000-0x00007FF8FA175000-memory.dmp

      Filesize

      8KB

    • memory/4988-9-0x000001E04CC30000-0x000001E04CC52000-memory.dmp

      Filesize

      136KB

    • memory/4988-11-0x00007FF8FA170000-0x00007FF8FAC31000-memory.dmp

      Filesize

      10.8MB

    • memory/4988-12-0x00007FF8FA170000-0x00007FF8FAC31000-memory.dmp

      Filesize

      10.8MB

    • memory/4988-15-0x00007FF8FA170000-0x00007FF8FAC31000-memory.dmp

      Filesize

      10.8MB