Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 12:57

General

  • Target

    12d60944c52bcc294d5c55bc20860ec7_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    12d60944c52bcc294d5c55bc20860ec7

  • SHA1

    37563cca9ff0ed0f4f4bed5e831d845cae3597c0

  • SHA256

    2ca519d47ac0ab709cabe70a89504d134475d68be47081be4ccd758d371619a4

  • SHA512

    16a2d8b9a6d592c822131fa94b3160af6a6a7ddba06934dd60b6dab97f2bd9e9e4fd2338aa45e458b33e5a1f612bed36cd7a848f9bf5788e51f9f3636275270d

  • SSDEEP

    3072:ffYWjswg4fQlt4ndm8jX5IXzs+M9VQHDOoOarvil:ffYWAw9fcUdmwIXo+M9VQHDZOAi

Score
10/10

Malware Config

Extracted

Path

C:\Recovery\t4jbvr9-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension t4jbvr9. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EC0EE6A17F515D06 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/EC0EE6A17F515D06 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Ojf8P+MGCqSwpgKM75P7hvHlwU3U7Gj0g22qOXu2eZaxzDiqzdt51wXoHMQKv6NL uIWwYnchEKWZj1VflcICjKuK2/wFE2W7gXPw4la+aEZhAnvME0AA1FZSn/fCKK3W /pTDGPx/mr7BXGCIKXZILRM91IcThoq4ESI0qh/HC+1caslIZ4Qnq9IAC3DOBy8t r2+cu+i38O3UZIW8ZyBTREh96GmYIpb/kZB3cC3j/yk0j2fZaww+n+fCtEol+jqL srhAJJ7iWUA+3IEmPv1qG1RvxDxzFlOsWZhaXuvHUhZ7+ltHNDoBkKVtmp6UNkEx gV5lWswED9LPdKLiKymNHnKM4vTuD9rQtMi9osKn36PmCT/YbVQveNZB0WGUyVvv twcNaQ10+ldMegiNNtUOfQOzKXEBpRkaexXG3s6TcVjz2arrqHer5Jq31IFCORl3 YplgokL3M7ohE3/QEBXDEcL6Oh22o53i9VIMVGsVaVgW8ZZhmgVtQex0VZ+ZUFrR U560zLNnDqbZvBLhZEB1JR3pk3mbmsemkB/dNOOwHx8PtILpkSyKBU4035P0G9ab rauTQycO4MNagTEmeVOJF7oVQEbN4eFBKGY+KYbtrpaxw4uyR1oxw3NLCf1QRRHM Bi6fY81WKzuFboTp3duf6Cc6US8FicuXvt6beHbDglKiMMSh2cOumB7TWpw7AE/h nqQWm6JAGF+6xwelYhbf5R/KXnh1ZdZUQMpPTYkyZjfoyMazfBJvXUYIh/PZvVLx T/3NgUz2eQshepnCfyAj971NNA5UiYuqE89qBiks5CUAdgm9gW2VXvUIztInik/M 0Xbjg9Xj076mxwpOBaDVuuyaVeWANIXLT3SYqLX8+QdxmEeIYNl8Mqdlv7E3/it9 fjJFhOHQLYSei0R9A5cfXCQvFLNLz4YdzetL7vROwPh8AtZW/Q+8F5GK4mQ0q5DQ RmlxW9LokwUrlW1m91vEd/3aUmCdF96mU1qm2vSvZFZng9mWthga1gufx8MZf+w3 AseuLTY72GonLD22dsiAqqoju/iWr2TF4yMmQs9hQQAnoVFCRmLuSdgJ22XE1qcE PYU71xNqCu40r2blfRJvWY+tcmSZGQ6vukwzIeIsjWv2OVkE1KYyeZTiZWzDZ63u rjiTcDKLTf6Z/2XKbmSY7b5rr/XaCZqx8I0P0FXbAtxBQ5nCi4/GsKBkcmpmy10c qub0oU6shDS6o7c/YxuYSFaYPPU= Extension name: t4jbvr9 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EC0EE6A17F515D06

http://decryptor.top/EC0EE6A17F515D06

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\12d60944c52bcc294d5c55bc20860ec7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12d60944c52bcc294d5c55bc20860ec7_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1596
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:220
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4424
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Recovery\t4jbvr9-readme.txt

        Filesize

        6KB

        MD5

        5b9b2523b74c7020945a613d23637d0e

        SHA1

        ea71f81dace3f301b504306cce65fc781fffa378

        SHA256

        a9441e3f881b8550efb6522c992e0283e26310282bc05f60a872a74e51522712

        SHA512

        4e385c99be0951ad17d5fa379bdcf9795f33e9a04cb383a9d5bb813f150b03f985640dccacff17302e5cf2117fe6b579f09ab3a5fa2d685d40375f011855eb7c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ky0dcxjp.yn3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1596-0-0x00007FFA05EA3000-0x00007FFA05EA5000-memory.dmp

        Filesize

        8KB

      • memory/1596-10-0x00000192586A0000-0x00000192586C2000-memory.dmp

        Filesize

        136KB

      • memory/1596-11-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB

      • memory/1596-12-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB

      • memory/1596-13-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB

      • memory/1596-16-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

        Filesize

        10.8MB