Resubmissions

05-10-2024 14:22

241005-rpzl6avdkm 10

02-10-2024 19:27

241002-x55e8swflc 10

Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 19:27

General

  • Target

    0c280ffb12537bca109724ec89d1ccc6_JaffaCakes118.exe

  • Size

    179KB

  • MD5

    0c280ffb12537bca109724ec89d1ccc6

  • SHA1

    a8d5d8d5d1b8f288e919fe303787c5e1869ad653

  • SHA256

    a728d45de941ca5730401f224c80fa1dcc2224477e309f5e4a1de8276939dfbf

  • SHA512

    13c15edf4f022f74b3dd57cc203dc5a6bdde773a85ae83df772d536dd4c538ac11415a7c5d8fbb8b39e5e27c52d869a4b5cb19eb7c21c799e4bd8a53440b568a

  • SSDEEP

    3072:yEa2d8CfSXceqmPDu4lPZU/CZtpysa8ustqzhy2Is80nwnyxVps:ACqlPDuGPG/abesYzg2I70nqoDs

Malware Config

Extracted

Path

C:\Users\lb0z4onv8-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. CDHFUND. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension lb0z4onv8. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EB58674A9331D3FD 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/EB58674A9331D3FD Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: KZevheRczSPfGHkQEfq8R6C5FoUNVz3yyAAUYoUPq1zqVcBN9mAKrXe0luBN/0gK 12RmvmWFm5HwmalZ5xARuH0rryBvKJR2okS6niOSYELmYhZkFE+UbqVaZ1ppaMfa pbp1JK/OhX+Mra9VKN4ExfVG22IGuFzVX80kp7lMXUkpivXC1ngN5eJ6Q55M4PnA Hr8SDdwDb0cWVsROzLr+dRCM4mx1mLTPygBYpUAWWcvK4aAeh5/Bs5fDa+jts6bZ IV2B3cAH8+GFHLsUx7GUnpYwbZy4sy3K10gPVhXw01+6DF0e7uV7KffmSUS6rlo8 jvA7ajETd+fNAHk0CnlNVmrKWsHrDnYxUrJR3TYVM5SgeqCfJuN5fdBWlfNSlI8D 9IM1wVtSglaR7kSqB35ckGHsaPbhFiLphUPSyLn3848/LxYgpmJOKMY9krgxb6OX bQ58zNYW/7SoRowSqiVUqE/o8lbhq5LWNok6xJAbRnfW47cao8J6W9apCpAb7j3S EA+fEmz2DTZcijcnXi0HjAaGF2iAjkmAZQcXeqnP7LXZmrQLyyOJpzKIkfatnVA8 HXonNGUoasAnSq+LY7esrethQOQ/KsUiffmUq8wPjR1KgYcAsyqVkC3YujARnEbM hab0svrKRf3Wl358hVwoJqSUpxL+4CwfukngSW225SIX7AfO/HUxoyprAJ1dMI0n GCU4Ainkt5ac4rXhZ/gC/LeY0m/WLIMkBID9g2rsnS9yf5zUeC+CXWivQyjoKRsA 5HrQdfLK8yVBWojp5Hf63k7cGNBbOJPZzsTeAPcLNfUgVQfdYzvQ4eVrYnirj7Ke MRuuOkwOuMoPmB6agM1XlLc8Z0Z840Ue6O4Au4lt902Bmnb4r4k2Fn9GBXFB90ri b573CzslnDQIXSJWDp4VQD/0UQyg5Wn7Wdzoik4wlYMgEI3tHQSPNpjdHn8HaVJJ p6RiWJXLFsufFulQ/u22eurLStCcpjPVwCuXVKG150nH9p4uzYZtEQKIWOU53iHQ +lSzGVRpafm/0gAutstfHjGN79RcZIVr/aHNzSLYnQN4evsXF0mgRJQHDX1yVJmd iGoiHGIjU1v7KmyrneJKfohnmLzGkPbQkbogwGKF5u6PLSk7R2yGUXVCUNXADIPb wGeJH8VusX+cyZ/PPaUqu2r+2g4CNJPYVJmzLDQIw1zmMBjuwm62pATXBzM+gDru +hvrasEMkrMmd6KJYkuJE5rFqCt9WCxE Extension name: lb0z4onv8 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EB58674A9331D3FD

http://decryptor.top/EB58674A9331D3FD

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c280ffb12537bca109724ec89d1ccc6_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1468
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:4456
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eioa0jqt.cyz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\lb0z4onv8-readme.txt

      Filesize

      6KB

      MD5

      651765509b6dcaa286c691e69545b50e

      SHA1

      4756ed9ce9938837a158a8a6f1639c1c5efb85f2

      SHA256

      8158a0917eccc32c3a948a8d1983c853937a801eea18e1242c8d474c1a37b706

      SHA512

      737b368d1c80bab65aec03737583f3cda16e46f4d73da413576d943035da24f2428a36258c712f6625de0359d04fb3bb410df39c2fbd42396d07a0dbca9114c0

    • memory/1468-0-0x00007FFCB68D3000-0x00007FFCB68D5000-memory.dmp

      Filesize

      8KB

    • memory/1468-1-0x000002930FF10000-0x000002930FF32000-memory.dmp

      Filesize

      136KB

    • memory/1468-11-0x00007FFCB68D0000-0x00007FFCB7391000-memory.dmp

      Filesize

      10.8MB

    • memory/1468-12-0x00007FFCB68D0000-0x00007FFCB7391000-memory.dmp

      Filesize

      10.8MB

    • memory/1468-15-0x00007FFCB68D0000-0x00007FFCB7391000-memory.dmp

      Filesize

      10.8MB