Analysis

  • max time kernel
    18s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 22:34

General

  • Target

    ff6818d770e34c64c37e6a83a7b24be5_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    ff6818d770e34c64c37e6a83a7b24be5

  • SHA1

    8af7c387cb323c180fd9c4fde99572a0af8fb228

  • SHA256

    47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c

  • SHA512

    b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63

  • SSDEEP

    3072:dopp2Xda3yJQZiiykM2pngXEOkzob8AUXT3INq:dGp3zZiXkMEnSEVzoQFT8q

Malware Config

Extracted

Path

C:\Users\08jhyhvy1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 08jhyhvy1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8FBAC3E418CA5F82 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/8FBAC3E418CA5F82 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: C8UDQMzpRarViWfvlh2El5gYZ4HZh1yVtDKUVaijMH24N9IBzSp4rzyWdhe4I2Jm TsnbMEvpxOjSpQQsgXeo7mklXucAeGFFh3ERvLBnHsuqgpAJFfvE77whheYBTBX2 B9LbEP+DHHvn9QdX0zAQw8siplkVos4tsD073/qOnmj0VdxAd+XbiFkQ1Dqw6o2Y 9O7cXSgJbNI4NwkYq04gllnY3pRe035oujXx1M7S8NUngeo0L/P9yNEQ7B6qrq7M t9EMLg1Ah35oSjS6bIkoM0ituUNqWqMf+2iM3ux6Ga9i4/Kc5flVKdmgnS648ef6 DJlJ2L959W2ecwudueaW8xKu04l5gd3zHHkp+wkPgiGd9sgStVbjYaEFjm5OFHDb BTKJ1avxZShNtLxmqQIXh1l9OtvGOKpelp4te1+0/sKEN2r6Sn8qKWR0U9BUfeys zHr8SV/QPybI8rsl5+DLWlIO43AG0zef9WRs9JjFUZ6Q5V+X2wnRf+xf0LTVpHLE 7aBXBGdwxxqy3p+fGSH6QorXKLVmiv1dRVPELfJHTMrQB+Bn5xKYjKA0hEwu4xZw dqH3+z5fwQ+l9tqeeyzI2xBc/Mwfhrfn34sGhuVFr1XUQoWjLklGiRCQHCmkAUda 3bbT0rbLcU4ZAKluruBtbJONbnPPPY9cADFLM1bdHsvRtI3mSza7zKOgcJgELNGv Z9tb65yMfxE7ybAFDXxx1VKJWNLKbhZExQ1pV1r0Nr3UbNtzLkCj1CIQ3ENcsfnn S0lgDqt/i5pltDx5eH4CjmgSKsQzu2E8F46TILG6+37veU/zird3J6L2pBL+Vqtr 6FjlQ5WEnExWLwzOShRUlYVMaL9H9OSUTSExOZbFpg9CB8jUK2PGfZKJB8qETtgT f4B+9rYil2hMLqPtKoqQSC0+DKnX4rfHtlVsz2wCvi6JYhJ2amMLxD5I0n38K2eM fLv9eRkrQc9SPc0gCECIk6ThcIPhvBtqhXJVnuqwwAgvNSrsBd9KhKGwkhOELwyX X1lCsVIaIlYPpGX0AiSNO5j/mX3y53PQYso2aV2PTlbbBW8cFI1DlU2F5AiVZHFv zMaTTTIUEywEAeDwN7k3sv4CAeqSL1XXa8tj15DiZ/tvotcDFnQnQH6RNEp+v+g6 UU7WQ9lLOuo8q3EVh+vmpbw3pPWq7RGaPeFkZtPuvXRpAcPicW23+ninHGYIWtP7 9QUQTgd0U2Lra8BqjlZzdDzU ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/8FBAC3E418CA5F82

http://decryptor.cc/8FBAC3E418CA5F82

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 37 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff6818d770e34c64c37e6a83a7b24be5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff6818d770e34c64c37e6a83a7b24be5_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2480
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2176
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\08jhyhvy1-readme.txt

      Filesize

      6KB

      MD5

      4c83e1dec4e072947d5d853772f6db59

      SHA1

      bca8ee864f788b8ac8962d50ea21ebf532f0e7d4

      SHA256

      79c13a5f07dbf3b98205af56bb6104602d7d0cee8c270417794e6968dcd92d6c

      SHA512

      f9810537d1479666276d28df278cff677ffb9e553380ed806df7de09cc8cc89149c78173072bf6638b6b6a9d59465e01fe7598fdc3576a68dbb455f76056c645

    • memory/2480-4-0x000007FEF592E000-0x000007FEF592F000-memory.dmp

      Filesize

      4KB

    • memory/2480-5-0x000000001B240000-0x000000001B522000-memory.dmp

      Filesize

      2.9MB

    • memory/2480-6-0x0000000002670000-0x0000000002678000-memory.dmp

      Filesize

      32KB

    • memory/2480-7-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB

    • memory/2480-8-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB

    • memory/2480-10-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB

    • memory/2480-9-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB

    • memory/2480-11-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB

    • memory/2480-12-0x000007FEF5670000-0x000007FEF600D000-memory.dmp

      Filesize

      9.6MB