Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
-
Size
116KB
-
MD5
586c80559a50dc4a431d36caaf3c2694
-
SHA1
f59dc0c154de3f02804f643047db9beb2f3a579a
-
SHA256
83002399482a30115e37cea0222fdb265cc6d57101ca7ce4591374acd6b8a371
-
SHA512
b79e1a4a28011ab62d8a86c8ceaa3d8dc8959b76fbe7744e9290e8c9d89dc8afaaf3e59a9b80c12885301fcfbc2b4045c65562470e3fde06cf7ed7e9c860594d
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AimHm3VXxF7I2Gc40oTtK:8vnuGqfGOqVBiXg2Gc9
Malware Config
Extracted
C:\Users\sh5e4mk2-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F44709FECFF195DF
http://decryptor.cc/F44709FECFF195DF
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created \??\c:\program files\sh5e4mk2-readme.txt rundll32.exe File created \??\c:\program files (x86)\sh5e4mk2-readme.txt rundll32.exe File opened for modification \??\c:\program files\FindWait.mpeg rundll32.exe File opened for modification \??\c:\program files\NewUpdate.au rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\sh5e4mk2-readme.txt rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sh5e4mk2-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointTrace.wma rundll32.exe File opened for modification \??\c:\program files\GetExpand.png rundll32.exe File opened for modification \??\c:\program files\LimitFormat.dxf rundll32.exe File opened for modification \??\c:\program files\NewSubmit.wmx rundll32.exe File opened for modification \??\c:\program files\RepairOut.mpeg3 rundll32.exe File opened for modification \??\c:\program files\UninstallRead.ppsm rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2392 rundll32.exe Token: SeTakeOwnershipPrivilege 2392 rundll32.exe Token: SeBackupPrivilege 3044 vssvc.exe Token: SeRestorePrivilege 3044 vssvc.exe Token: SeAuditPrivilege 3044 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 PID 2224 wrote to memory of 2392 2224 rundll32.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2536
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD543a64d785aae4faef79ac4f0173baf7a
SHA148da3f9eaac6dd5a512a0fd4d026cfa3c3c7522f
SHA2566a0f8fea421cfe319b639d90131ae804dd76127da6a2126431a75b85725b4629
SHA512f0eb707c4a408e2a841a873d15d43f93483c236edbc4a5981eca6d17ce47c2c0a030b636e33a22f2ec15e175ac223de53646339ee45bc03d384376329ea699a4