Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2024, 03:53

General

  • Target

    586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    586c80559a50dc4a431d36caaf3c2694

  • SHA1

    f59dc0c154de3f02804f643047db9beb2f3a579a

  • SHA256

    83002399482a30115e37cea0222fdb265cc6d57101ca7ce4591374acd6b8a371

  • SHA512

    b79e1a4a28011ab62d8a86c8ceaa3d8dc8959b76fbe7744e9290e8c9d89dc8afaaf3e59a9b80c12885301fcfbc2b4045c65562470e3fde06cf7ed7e9c860594d

  • SSDEEP

    1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AimHm3VXxF7I2Gc40oTtK:8vnuGqfGOqVBiXg2Gc9

Score
10/10

Malware Config

Extracted

Path

C:\Users\xl7n62b2-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension xl7n62b2. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7C6E1CD560A3B683 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/7C6E1CD560A3B683 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: O5rd2D0LlF9EYFacbg9NLrfjEpVCZleGUPpAfziqVtUrMiXqxejNtTdxx1NOrGJN mXENNiwFcy0+b2zAkFeafUYeYh0ajpU3kJuZRaXH6/Bp9EvJsXSR7RLrrbul0OfS 4MdhceuocM/w0wHsFKpIZ89j1OCK5Judw0itwYzrRLzjxt9j0syL+xd0GVf/kSJh oGRdi8ofA7FXsrBdtSX6ffKzyGMlWq2mG0z5HMvPHNTv7MeMzASxjdCSmDLhBQ0x uQexA2Vp7wBmOKzAcO+56xMXO2wsQAh0awFjjKIf6iAksnF6CE0+i4xlmqzGStXj 4HFRzixZj3M8YIFjVqijUFuNpaFwNbVJuqGKtTAQcxG44e4PSJ4vbk3iYbg48PeX hEP2W+d1KmIJdw00i4D+bwtQwvU+X9l7zlVTQ7zAMxQA5dUPpAlO9MP1Ij1pQgHy fMmpGmL9tzfU2Bin0rC9SMYZfpq032fiuxp1JAb/bIFakK6flCKyBg3oXw+KJ2G9 uvzwtn3ha9MvnCV49WbQuxtGkhfkYb+5KZAF1GP2Lu6zzioA7+CYcakXCinfjucb wxxOG+x3qwRulo5YsVvNVAJWU7lAOvFyKAHScmuOiBtIspJtJG1L5hiRrpwXjbaL 45EAbVaSGtVSx1Cnu01IsLnWOZO3Fzl4Ly8Js7zM0SHpR1hmNfUSUTHyIdETDUUD HI8nrjo3eNxM/UZ3KmOLQEMbRhwCJHMQcbtr8hm5/LzcoXEO4M5mdf0qq6+5EeWU IuxYNcKh3Akm6i7cdEly+XkR1oqy1CSx9tadatHvRV3JELQXwdbWyIZi4/pm4B+z VjEdGsuE+XTXSEels037d6+fa+STQhnYnvulM2a0layCf87kwWxHU+HBavzCNIyI pLPbYoi2SmnlthhceMjVDFObTyEEFc4sU9Egelma1Bzcxq6mQy9UM+3uy+8WotZv clzMHCfr2ve6DJZ11pu8WygXlkti5g4H3OlXGC6o/JP3SHd5thsy5Wt3yI9Gizlu 7WCXPjDkfFtbsTLXcTGaUBFSEVWen1npkX1Up0IUz/izujvbhCX5Gr4nUWKWqUo1 gAvYWYXDV834k0TooHnk1BnJfvIYABlJeor7PXgvsureOMep+l/JAXWgZ7++dTJh SfeSUistBBQEDZVAFoMdog9yiEhN6VFvcfOlLJqRXHhS25ss31SopQB9qZ/+mcad qCH1F3cuvMamOqnsojOSlajQHdjxSD4xk5EFqjkbfOuPgfsICPtx/a1ZGYtFm0aM Y4PObY/NI4kN+5xTqop614KmWN2xryXfaalFt1BMmxoWA6lU+/sqMRlJPMMGs/Id S1hVh52KcyEf6bFgjUByDqvlT7VzF7oAjwrkwNLU6OIeFb396GHl1kd0 ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7C6E1CD560A3B683

http://decryptor.cc/7C6E1CD560A3B683

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#1
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3084
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\xl7n62b2-readme.txt

      Filesize

      6KB

      MD5

      9042713f628f964ab6792f07db086b94

      SHA1

      bc92db9e2411aa5a008e88c280297ee888005dd3

      SHA256

      6cab0a08e5a9af40efc0d79942a994ec0458d25958b7db16ad21678fe2a71104

      SHA512

      045e75c436ef9cda1f42aeb25e2a86dba1795ae9e4097d98619e3fe51d08493ae38bbe9d50b4836afd1e862bf47db056fd32feac8269e8ca8ffadde23a341b9a