Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 10:20

General

  • Target

    0e3a73d5941bbe2e577bbf9910e422da_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    0e3a73d5941bbe2e577bbf9910e422da

  • SHA1

    9a82c12a54cdf85063ebfe9eb97444f49aa68f51

  • SHA256

    8efde1792c83d66d2bf46cdfc695bb5f70edeefd951b70c403960ebcf2ca712c

  • SHA512

    7780e7b1aee337c2d9440ac6f9997cad698cf633118872edd3daa565a8de5330350f2a61cb0b35889e518871c840075f68b39e9c92624783bc7cbb8f88a49ecd

  • SSDEEP

    3072:WGYFrOdhfkQv9jrAprhFmyvEjQDKaUznxQacKt1Cilb:QadFkMGhFjED39b

Malware Config

Extracted

Path

C:\Recovery\b198b300-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension b198b300. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/721F9F5999A7D493 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/721F9F5999A7D493 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: kFPskfsOGbbLn1qGBw3r/uH6XqEl0uPd8KJ7h6M1Gfhv2ktH7kJUEbmQCEOItER3 QTZfYiWQ6VFTTY0bPJZcIzoqYsHly7CUuZd53mYz3JyIFIrooTPUP9ZIwVujo8eX a0LgKAGtovxNy5YYhu7s1N9TgZ4ZE+5QF3OwhbXqPnm+/sDzPakF6byyru+7u7oj DLE3+BMpqb80Sk790Orsy8fhiZeUH7O6U9ij2uYXZRkst+B0Uz/nMo3T2N70IaLH rY3OHAaRDki2uYs58pni6rY/a6ohMGgjBTeIqfd2J9QQlVhMhv0AS1XtOH8nqq2M Oe3wSYhqk4et7Hr5X7RhWWR2nOKC7thuQmUZMoMEr+cc25GAvv8MaIS1TSJ3s63A iDSa+uJb1DNQMHd2u//WJck6TvIeCnjRS/CwtkNUqls6PFqWgWt4Hr1wYBskqJya ozRZYVVm1zDBHmm7dXokwbSpvWwiKBGg2JXaLxfijL4Ke3gQZGBqwd8mFeWC0+fX 9EgrV+PeUwlkECmkx9zmzwBW9D7fq+baD/toqk9/H2LHkczHoAnIbwuSVfIvvHB2 9tgk3X4KBoTHwkUp1Xzp2oLiULlzCp3zIeF4dFJW+B9JW6hihYt7BneVBSWKm2IV XvnM4oV5R+XrlJd77aTOEPSUSjcau0AqOW4uFjWQ8zQObPiM9YsYrmR9ZbpOhoI0 G3UmacGiiaBdWMQ4+aZumo5OTuPkEZw5Pr72jeldFs4h7bOqnFEjrSUGZtbX9+5Y GONcuj5bPO1YkWDmvjEz1zhpSbVF1ofwVpbOnVVBQzDOuaPMBCWxabg02twNhYu5 Zm640upNo9ZIg9zbNImNVXCHk+GKsy47ZMJwuw5spd5biyWX1MUkwcZ/e0kRhHwv EPijOBxuCDp173UZEGWYDaoJBzJzdMNELnv84y413SCDwBB8ma2fXG5+Vu6voezo 73Zgl/EqNTsRz8qBYxchHhmKQZKvpEtO0bB+TdL3hTa7kMZI3qE1pU9MNtfCgKqq zkwz26OARxTagWbW3RwDtWOHQaf1JVSMty5SgOfKZrMKUUXtQu6l+bMEM5tC3WcD JsYfgxkNPex5MOX0nPt61oZY41iQjzhavtbWD/ZZBRF6OcUsU3YfLa1Ot2PpJhqN BPNw+GCflvogAOZvAQ9trWlT+KpmnWm4lBM+mn86K4mk1CozmmK42hKLB2jkDN7H dBsirgRb5hGc5ifOFmL0OA== Extension name: b198b300 -------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/721F9F5999A7D493

http://decryptor.top/721F9F5999A7D493

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3a73d5941bbe2e577bbf9910e422da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3a73d5941bbe2e577bbf9910e422da_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1804
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1696
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\b198b300-readme.txt

      Filesize

      6KB

      MD5

      f63edc975462b8c6358db36aaf654dbb

      SHA1

      461b37d0329a472cc07ebdabce3d62868e858621

      SHA256

      671eb10b5d10404ef9b11a17ed92ee1947ab531775e696ad1f25e006473b8f68

      SHA512

      b4e4a3e699844f6f5abe3b96b5b6145067f4d9a03af338b64eef9ef50339ad73be132953bcb7aab262aff4d1f9332d90f7d1090bbeebd48d67d5988a3eada5c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Cab3017.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar3127.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      192KB

      MD5

      7db76d6793db6ff6ee514ec1572bb6da

      SHA1

      57a5a036809865c9fd424e011228b52a4874482d

      SHA256

      5bfc1af10feb85351c16dbc1e7f03b829c4006e0ffc8a5b208447d7ef355b4e7

      SHA512

      4221a2c0f0a14c7a6d99a91bd36e359c2290c82f3bf5fb73e067472c98784b6721513e44070ed10b55bcd7ff85b19055642c4528b9179800b8eba2990af6da37

    • memory/1804-4-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

      Filesize

      4KB

    • memory/1804-5-0x000000001B590000-0x000000001B872000-memory.dmp

      Filesize

      2.9MB

    • memory/1804-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

      Filesize

      32KB

    • memory/1804-7-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB

    • memory/1804-9-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB

    • memory/1804-8-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB

    • memory/1804-10-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

      Filesize

      9.6MB