Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 13:06
Behavioral task
behavioral1
Sample
12ddb6465a43fbeecea2d2989f2caae8_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12ddb6465a43fbeecea2d2989f2caae8_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
12ddb6465a43fbeecea2d2989f2caae8_JaffaCakes118.dll
-
Size
164KB
-
MD5
12ddb6465a43fbeecea2d2989f2caae8
-
SHA1
75ffba09e29e8f7481eb0844b601d7c9297aa855
-
SHA256
1c32da0dee5624d5cbc755a0cdb1257bf43f07c61fb03e8f59ef94ed2cb58869
-
SHA512
dbad58b9f12dcf81f7aad638005ded45768e943ef54165e81b9f2a70653e0d91d376c8374850c5c73ba0362950b4dba6b204bc36c9cfdca4d262584bda4c8019
-
SSDEEP
3072:v0XoUeZ/DVS8L73ea4MoCLfqQvFfIrgPxOsEpa1UhH:veoUeZR2TRCWQFfPEae
Malware Config
Extracted
C:\Users\tilm1j-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/123C0D3C47F4A3C1
http://decryptor.cc/123C0D3C47F4A3C1
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\J: rundll32.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\program files\LockMove.rar rundll32.exe File opened for modification \??\c:\program files\UnlockRepair.scf rundll32.exe File opened for modification \??\c:\program files\WatchBackup.xhtml rundll32.exe File created \??\c:\program files\tilm1j-readme.txt rundll32.exe File opened for modification \??\c:\program files\GrantReceive.dib rundll32.exe File opened for modification \??\c:\program files\InitializeAssert.wmx rundll32.exe File opened for modification \??\c:\program files\LimitEdit.wvx rundll32.exe File opened for modification \??\c:\program files\RegisterCompress.M2TS rundll32.exe File opened for modification \??\c:\program files\SelectUnprotect.wpl rundll32.exe File opened for modification \??\c:\program files\SubmitFind.mov rundll32.exe File opened for modification \??\c:\program files\SwitchResume.jfif rundll32.exe File opened for modification \??\c:\program files\CompressSwitch.tmp rundll32.exe File opened for modification \??\c:\program files\FindSave.3gp2 rundll32.exe File opened for modification \??\c:\program files\UnprotectSync.clr rundll32.exe File opened for modification \??\c:\program files\ConnectExit.gif rundll32.exe File opened for modification \??\c:\program files\SelectAdd.inf rundll32.exe File created \??\c:\program files (x86)\tilm1j-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConfirmSearch.clr rundll32.exe File opened for modification \??\c:\program files\PublishFind.mp4v rundll32.exe File opened for modification \??\c:\program files\ConfirmUninstall.rmi rundll32.exe File opened for modification \??\c:\program files\GetSplit.ex_ rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3856 rundll32.exe 3856 rundll32.exe 4940 powershell.exe 4940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3856 rundll32.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeBackupPrivilege 3604 vssvc.exe Token: SeRestorePrivilege 3604 vssvc.exe Token: SeAuditPrivilege 3604 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3856 2648 rundll32.exe 84 PID 2648 wrote to memory of 3856 2648 rundll32.exe 84 PID 2648 wrote to memory of 3856 2648 rundll32.exe 84 PID 3856 wrote to memory of 4940 3856 rundll32.exe 89 PID 3856 wrote to memory of 4940 3856 rundll32.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12ddb6465a43fbeecea2d2989f2caae8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12ddb6465a43fbeecea2d2989f2caae8_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4856
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5b8a38de7199ba63ba8224a3c528a022a
SHA15b23e2b3cfc8737eb0332da6dca496f350802e41
SHA2567a8a513b30944918cd2b850da27d9c144de988d9b828577dba8d4ae7d536729b
SHA512a105a04e0649e66f574d8664b569a2e7435f861a30a5db0dc5f823eb0a45d1ead6ff4af62e43341c652cfc5e55ad4d34493c4c3d53c0ac346bcd310092279fa0