Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
432762b33257f4141a6bba741df12acc_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
432762b33257f4141a6bba741df12acc_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
432762b33257f4141a6bba741df12acc_JaffaCakes118.dll
-
Size
166KB
-
MD5
432762b33257f4141a6bba741df12acc
-
SHA1
fad7158d984be89c9c02837ebee741605f878e83
-
SHA256
997002d2e69d8b491d6bc9d9617add41fa8997b9add6f9b762f67972575ac616
-
SHA512
8cf350107bb8e1a8c6e6bc58b84b8d1c3762104f019880a42cb57a32376a5e892d332acce171aa6fe0815ff53c952dd997eeaa42c151ae2d2cb0556f9e97630a
-
SSDEEP
3072:MJMawtnGqtWoKeZ9fh1CgnNto6jfyKON3+yugCr:Ww9vteqJggn7oUfeugq
Malware Config
Extracted
C:\Users\51t90-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/1F91C0DA2F241912
http://decryptor.cc/1F91C0DA2F241912
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\S: rundll32.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification \??\c:\program files\PublishJoin.jfif rundll32.exe File opened for modification \??\c:\program files\SetGrant.eps rundll32.exe File opened for modification \??\c:\program files\DisableShow.3gp2 rundll32.exe File opened for modification \??\c:\program files\ProtectAssert.tmp rundll32.exe File opened for modification \??\c:\program files\AddSearch.xlt rundll32.exe File opened for modification \??\c:\program files\DisableMerge.pcx rundll32.exe File opened for modification \??\c:\program files\SuspendRead.mov rundll32.exe File opened for modification \??\c:\program files\ExportReceive.vbe rundll32.exe File opened for modification \??\c:\program files\JoinInstall.gif rundll32.exe File opened for modification \??\c:\program files\UnpublishSend.eps rundll32.exe File opened for modification \??\c:\program files\WaitTest.au rundll32.exe File created \??\c:\program files\51t90-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertToUpdate.wma rundll32.exe File opened for modification \??\c:\program files\FindCompress.wax rundll32.exe File opened for modification \??\c:\program files\InvokeSubmit.TS rundll32.exe File opened for modification \??\c:\program files\UseCompress.wav rundll32.exe File created \??\c:\program files (x86)\51t90-readme.txt rundll32.exe File opened for modification \??\c:\program files\BlockStep.vst rundll32.exe File opened for modification \??\c:\program files\RegisterExit.xsl rundll32.exe File opened for modification \??\c:\program files\SplitPublish.xhtml rundll32.exe File opened for modification \??\c:\program files\HideOpen.htm rundll32.exe File opened for modification \??\c:\program files\LimitSubmit.mp3 rundll32.exe File opened for modification \??\c:\program files\PublishRepair.pptx rundll32.exe File opened for modification \??\c:\program files\SelectSwitch.css rundll32.exe File opened for modification \??\c:\program files\SkipRename.mp4 rundll32.exe File opened for modification \??\c:\program files\CompareConvert.wma rundll32.exe File opened for modification \??\c:\program files\ConvertReceive.svg rundll32.exe File opened for modification \??\c:\program files\SaveStop.ogg rundll32.exe File opened for modification \??\c:\program files\WatchApprove.bmp rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 556 rundll32.exe 556 rundll32.exe 4948 powershell.exe 4948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 556 rundll32.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeBackupPrivilege 2764 vssvc.exe Token: SeRestorePrivilege 2764 vssvc.exe Token: SeAuditPrivilege 2764 vssvc.exe Token: SeTakeOwnershipPrivilege 556 rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2268 wrote to memory of 556 2268 rundll32.exe 83 PID 2268 wrote to memory of 556 2268 rundll32.exe 83 PID 2268 wrote to memory of 556 2268 rundll32.exe 83 PID 556 wrote to memory of 4948 556 rundll32.exe 90 PID 556 wrote to memory of 4948 556 rundll32.exe 90 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432762b33257f4141a6bba741df12acc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\432762b33257f4141a6bba741df12acc_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1380
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD509bb7fecde0d1fc9d3cbf0b49a979e0c
SHA148c55a7dfc39a064ab7fed0d4d4ab81d94c9907d
SHA256cd856e5417f0454d4aee9af8c2c06a23bb9a621f6e024c71a5cd50083de6ead4
SHA512b3d215a0395e51755454a42bd39bbc8aca371798a0b39a6234d675e2e26898cbec3a23a51485cab0306d96c8376696b1d99c117ded8a0d6e7d48d417f2070b60
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82