Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19/05/2024, 03:53

General

  • Target

    586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    586c80559a50dc4a431d36caaf3c2694

  • SHA1

    f59dc0c154de3f02804f643047db9beb2f3a579a

  • SHA256

    83002399482a30115e37cea0222fdb265cc6d57101ca7ce4591374acd6b8a371

  • SHA512

    b79e1a4a28011ab62d8a86c8ceaa3d8dc8959b76fbe7744e9290e8c9d89dc8afaaf3e59a9b80c12885301fcfbc2b4045c65562470e3fde06cf7ed7e9c860594d

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AimHm3VXxF7I2Gc40oTtK:8vnuGqfGOqVBiXg2Gc9

Score
10/10

Malware Config

Extracted

Path

C:\Users\sh5e4mk2-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension sh5e4mk2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F44709FECFF195DF 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F44709FECFF195DF Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: tEX5h+jLdUyQKAbEJ/05nOxZ7FIKkYs9SYX6QNSHiD0ihPXSnEPRRnqkNd2qMaLR VBJJDU8k7m8gTE3iCPgnJ/nX8QAT5xUwI2Txid+SIubyT3uVk8cyqRW8Oi1oevPb Qb/WXqFee2sWhhkqQe+xSnIH4x30GmBF+tQqt2u0bYhCnv2jQpzqrHcC5R5BGoLy rXHZK8FJ4bxhwOXrziqjoehZAmlBAicJUddgHKS6GQN6evc1e4RHvzmIXSTYtSqJ s5j/JMwFmX1Hp0pNWQCjo/8+1KlWZ/96z0dGa+JbH4DJeG2ylyKKBwrD8JY92T9b fTRhwogL7PDONZcS3cfRuZ1rqgqkMFA2aMeKI09Y+OaO0+1bRpegAQ1zjp2MYFUo fVsTdqXCzqKTLl9EKHoOHTJy4xg/Liwpet0+RIwRMYkJI0fzP2O6oEIkql/TGTpo pQvCykpzkaidb3ErWmj3UG3NRJ4ePAaLif6zhJcnQBdhXWdemGt+fLlSzuML3UtX EVODGXbw5YQv3MkpsPXPyQwTwRLYgIcQrn7KOUazZhJGtSvpOHF/emXWznUI8Eq5 NTpds3d2/4qUd95yfhFmP+lzizCftN5ytqThTjI+oSk1xKzDBgU676hbxjGDIxgi Il8vVzm14LZ5wjhrLH67DaVFedRZlfkWYHsZ1KwQxbxByCfas2KxihAmRmSszxYF lWZB0Z+VNE7BLNMWBwQ3MbWuNuave55FDPG/un7V7Cn6kNkFFYIQHrs62u2ecFpL 2uvDk2rWjLGI4kaZ64osWLSMP2eOtWpfiNTRJk8cgYQdF37IVoxXonPFSv3Tkl4i aSFrMRGu3eEHiYcVb5pG5Lgmfw/DoxTpJXEbqL18H5xCHqEGdHBFgC9oGpkvNbUt NnEivX83I8OX596GsxvBFOD9LRATCnMHnZNC0SRbXzSM/gh69AfdwKyyv2EkHJlV LZSQP3bSqKihKgKV0kjFMzKMYLXgWzjUdciCGU/FJstVFlIGOEPQoCj2tKGty/OB 8wyNhzpr9tCgdgf/JyggWGgZ9rg8oGjvMJE85aexrVEzLykZxnKPFIA4k9QCsKWT mcD+XdrWrkvOB+sBuNtHPs/wxZR6GJVkoWbRxf1stnnBK4TqAMHm+Yv4wpAT/uan wceFAAQqqSoCTeQ+tv1B5q/paYTWNQLrxgprTOSmw++2EpgfANOhxvfB6TJupRco lyptKzDbS6ydDN2YzHV7bzrkeSfv1s1eYBt8RWztt0VdOI2WBzF/FjK6D+09Y84d JnCZ+2OqtrfXP68a7BCJ9QZothAy2ws/N8trQ1lvf9Yjk4BKlDDV82w9ekIW5cJb FZkOaTJ/a3we4xpKmfsPHMGe33VZL0WUOP8AYEw7JMD38L3l ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F44709FECFF195DF

http://decryptor.cc/F44709FECFF195DF

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2392
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2536
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\sh5e4mk2-readme.txt

      Filesize

      6KB

      MD5

      43a64d785aae4faef79ac4f0173baf7a

      SHA1

      48da3f9eaac6dd5a512a0fd4d026cfa3c3c7522f

      SHA256

      6a0f8fea421cfe319b639d90131ae804dd76127da6a2126431a75b85725b4629

      SHA512

      f0eb707c4a408e2a841a873d15d43f93483c236edbc4a5981eca6d17ce47c2c0a030b636e33a22f2ec15e175ac223de53646339ee45bc03d384376329ea699a4