Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll
-
Size
166KB
-
MD5
2d5012a0dcdb72409842b4606ec0ac48
-
SHA1
c6044b3b1d6b65be9fbec84846efa25cd8c30242
-
SHA256
7aaf4b2e40306cbb65edd0aed85a61ef4bbe538837684f48eafefebbdb871c11
-
SHA512
3f837cee85d9136cbbfce1cb13fd855d10893b8d898123930c46b99ebb4ed4a5c2d0a4f653e403b1f5f0b26601f330ac1d9c95766dc7e1483e393ee1919eb64b
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfRWQwOy8CwvD:Ww9vteqJggn7oUfRWoyBwv
Malware Config
Extracted
C:\Recovery\ra00n-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/EE30A8064FA7386E
http://decryptor.cc/EE30A8064FA7386E
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\T: rundll32.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File opened for modification \??\c:\program files\ConvertLock.jpe rundll32.exe File opened for modification \??\c:\program files\PingUnlock.easmx rundll32.exe File opened for modification \??\c:\program files\RequestDebug.vsw rundll32.exe File opened for modification \??\c:\program files\SearchStep.docx rundll32.exe File opened for modification \??\c:\program files\SelectRepair.docm rundll32.exe File opened for modification \??\c:\program files\UpdateSet.m4v rundll32.exe File opened for modification \??\c:\program files\NewOpen.ADT rundll32.exe File opened for modification \??\c:\program files\OpenSelect.mp2 rundll32.exe File opened for modification \??\c:\program files\UnprotectComplete.MTS rundll32.exe File opened for modification \??\c:\program files\AssertBackup.mpg rundll32.exe File opened for modification \??\c:\program files\BackupSend.eps rundll32.exe File opened for modification \??\c:\program files\GrantUnlock.eps rundll32.exe File opened for modification \??\c:\program files\InvokeClose.cfg rundll32.exe File opened for modification \??\c:\program files\SwitchRename.3gp rundll32.exe File opened for modification \??\c:\program files\WatchInvoke.mov rundll32.exe File opened for modification \??\c:\program files\ExitReset.midi rundll32.exe File opened for modification \??\c:\program files\ImportConvertFrom.ADTS rundll32.exe File opened for modification \??\c:\program files\EnableHide.wps rundll32.exe File opened for modification \??\c:\program files\ExitPing.pcx rundll32.exe File opened for modification \??\c:\program files\ConvertFromWatch.mov rundll32.exe File opened for modification \??\c:\program files\LockMove.mp4 rundll32.exe File opened for modification \??\c:\program files\WaitOut.bmp rundll32.exe File created \??\c:\program files (x86)\ra00n-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompleteUnpublish.xml rundll32.exe File opened for modification \??\c:\program files\PublishMeasure.mpg rundll32.exe File opened for modification \??\c:\program files\RedoStep.xml rundll32.exe File opened for modification \??\c:\program files\RepairGrant.vsdm rundll32.exe File opened for modification \??\c:\program files\RevokePop.dwfx rundll32.exe File created \??\c:\program files\ra00n-readme.txt rundll32.exe File opened for modification \??\c:\program files\ExportUndo.tif rundll32.exe File opened for modification \??\c:\program files\OutUninstall.aifc rundll32.exe File opened for modification \??\c:\program files\RevokeClose.gif rundll32.exe File opened for modification \??\c:\program files\UnprotectGet.mp3 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4600 rundll32.exe 4600 rundll32.exe 2220 powershell.exe 2220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4600 rundll32.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeBackupPrivilege 2544 vssvc.exe Token: SeRestorePrivilege 2544 vssvc.exe Token: SeAuditPrivilege 2544 vssvc.exe Token: SeTakeOwnershipPrivilege 4600 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4600 4620 rundll32.exe 83 PID 4620 wrote to memory of 4600 4620 rundll32.exe 83 PID 4620 wrote to memory of 4600 4620 rundll32.exe 83 PID 4600 wrote to memory of 2220 4600 rundll32.exe 91 PID 4600 wrote to memory of 2220 4600 rundll32.exe 91 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5012a0dcdb72409842b4606ec0ac48_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1744
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57811b6cd5685583c8f8d2bcfd7967c2b
SHA1bfe1a305b58d672da12427b9fc5a672f15bad221
SHA256d1a57d6f3ebf39d61243125144726b5e4156b6ab3a88f59b993a1efdc19223f3
SHA512d92ff45f6a1c0baaf3fefc35a17905c9d8a2ef393a853af0c740d6d47159af2f85e32cf31e83333a4f19c3edd572e74c0af410aa1515fcf69b54f46da2b88f80
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82