Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2024 12:20

General

  • Target

    f3a0cb122ce523e9f0fb9bc04fcc6756_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    f3a0cb122ce523e9f0fb9bc04fcc6756

  • SHA1

    f80bc74b31d78a67e430a9f45884334c2f685616

  • SHA256

    5928db8b7b1714ead51392ad809242cd5a158defefe5309f3ae0238c20a500ab

  • SHA512

    3d187707aa5978cec8cbbd9061714ba1cf7561decf8142f4ace4cadd0d0f73947e7b9a06c11b9c3fa1ff7c02229b3d4f24cd9a6cf6d48af1f2726af950df0f4d

  • SSDEEP

    3072:lYplXYpKWmsLbi4eTMlwDCnuyKz/PeQ7Gxl:2zI0WXbnWJTGx

Malware Config

Extracted

Path

C:\Users\Default\1jd431n8iy-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion 1jd431n8iy. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/84EBD62A1D154304 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/84EBD62A1D154304 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: GymgOmWNVEEd8zpsPO1wc4+XHRKyU/Qa9V+CvoGncrEgP0hrAIGJ/Mv7yDre3gdp 87q7nAuh8Cbje4Mx1q+iuTW8Dvvjp9nNNp9U8ojNxn/w71pGWuvIrAxAO2c33xzD 7PY0Y41p4VcGAj+HBivpWqmsHZHobFsjex4C/Zl1RFRL2/wKvQr4a06ifjbvHzHt vA/pKUhRn10KLhQWZLeSaU7KKpkl4nMOdVrfZ8XZkCbYExqr4hvEVMYy2BoaEgfb yUPr+dDPNXUFkZp6lpzRXgmoX2f0ksL3xjbpx1Bm1ZKR4Yqqw8Rp6hPuwrebg7oV bshTwlk3lYEHNTDTuOMNglaBTQlaZwzxRRQ0GYZ/0NCAW9s0rSJTDa9Tz60QFq8W a2An7hC9t8aoDL2JcyJcMd6DijOhye4QBMZzHdEOyhUe6ta8jTb9WMkwvdhaIY5+ iXoJXn3QCqpHGw2i/14Hn8oQj2r9I5wA6xNOE0DGaKdaK56eoLZgsE8DG9XNm//x ucQhw/YIM74zGnsBIVQEA5rWDLgoolNmxxDC2Rmavh76DDn2ljoz0pUbKVRT+zr6 6SGkivMfo5phnI8Prlj9jxTw4BBLrzV3hp0qFk3n3g1GMZAS88kT/Gi5c7ZHISgd ADmxd4ceUIbQ+Ea4NXhZaiCJk9ceUH6EatsvGV9/AaDdCPQnz07MbE0vhd8UfV5y 4nwOEuL1YRUV9zW3uonllHC4xQTAgR+0e9fW26rCAJj3rt6ykzslyvuij8pXmDiD vwlAoLdHW75NDc0fT+vDUcsg2M7her254fwqOpnlR7mumPPudoW+xXT/Hi/7kj6z HtpQ/2yBp4H2RVeNbOcfI5aZQzoGL+5iXuVYgLl7BTekwVZ5Z2S8c8yvKRFx6C/+ S/Yk+rzns9xgL9wDioUzOS4M50a5tyHjFwT2Rur60mcZ/lyXkCyPvk0LloOCM438 BRKgb5uq8N5RWf+YL9rdK9r4xckaPHWQSGc+rpr6Iac/kTLdM0tWSQUfx75kvKO4 wXuC8IqdrEVYl5Hq3ruLB8SZ44tM5TIMEeviIARSbYAvVb66C3BXGZd8ZC952jM4 /fPiN6cDYR8iZR64yBJM+kJsYUSIntCZG//vPmtDoxFVRtRijhOXJ06EiUtbnnwC 4bdBY3VP6M298lZYBmvdjlRrXbAtRHtXcgCEluLT3A0= Extension name: 1jd431n8iy ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/84EBD62A1D154304

http://decryptor.top/84EBD62A1D154304

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Renames multiple (159) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3a0cb122ce523e9f0fb9bc04fcc6756_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3a0cb122ce523e9f0fb9bc04fcc6756_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5016
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4212,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4508 /prefetch:8
    1⤵
      PID:4820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Default\1jd431n8iy-readme.txt

      Filesize

      6KB

      MD5

      2131532f468f8a08c8a4ee0b6211012c

      SHA1

      5007a63e672a78b3469cc8cfd45bae101371bab8

      SHA256

      ed4dcb35009692ed478ba924724239b60929bba097ab394e2a0a21b9ff66b521

      SHA512

      43c28e5d0f849052eab02514cc8286e996e7f1d9497a770e81bebbd4ab33a862efb90b0ee0f2f167d97cd600b221755f1adf653445b7cb5d51e476cec781bd35