Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll
-
Size
116KB
-
MD5
586c80559a50dc4a431d36caaf3c2694
-
SHA1
f59dc0c154de3f02804f643047db9beb2f3a579a
-
SHA256
83002399482a30115e37cea0222fdb265cc6d57101ca7ce4591374acd6b8a371
-
SHA512
b79e1a4a28011ab62d8a86c8ceaa3d8dc8959b76fbe7744e9290e8c9d89dc8afaaf3e59a9b80c12885301fcfbc2b4045c65562470e3fde06cf7ed7e9c860594d
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7AimHm3VXxF7I2Gc40oTtK:8vnuGqfGOqVBiXg2Gc9
Malware Config
Extracted
C:\Users\xl7n62b2-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7C6E1CD560A3B683
http://decryptor.cc/7C6E1CD560A3B683
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File opened for modification \??\c:\program files\OutAdd.js rundll32.exe File opened for modification \??\c:\program files\RequestSend.vst rundll32.exe File opened for modification \??\c:\program files\SwitchRestore.shtml rundll32.exe File opened for modification \??\c:\program files\TestSubmit.vsw rundll32.exe File opened for modification \??\c:\program files\AssertReceive.txt rundll32.exe File opened for modification \??\c:\program files\InvokeImport.zip rundll32.exe File opened for modification \??\c:\program files\TraceConvertFrom.bmp rundll32.exe File opened for modification \??\c:\program files\UseUpdate.pcx rundll32.exe File created \??\c:\program files (x86)\xl7n62b2-readme.txt rundll32.exe File opened for modification \??\c:\program files\ImportInstall.txt rundll32.exe File opened for modification \??\c:\program files\ConfirmResolve.nfo rundll32.exe File opened for modification \??\c:\program files\RepairDeny.raw rundll32.exe File opened for modification \??\c:\program files\SkipRemove.jpeg rundll32.exe File created \??\c:\program files\xl7n62b2-readme.txt rundll32.exe File opened for modification \??\c:\program files\CheckpointJoin.search-ms rundll32.exe File opened for modification \??\c:\program files\UninstallReceive.vb rundll32.exe File opened for modification \??\c:\program files\UnregisterShow.dotm rundll32.exe File opened for modification \??\c:\program files\CopyRestore.mpeg3 rundll32.exe File opened for modification \??\c:\program files\RestorePublish.docx rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 rundll32.exe 1280 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1280 rundll32.exe Token: SeTakeOwnershipPrivilege 1280 rundll32.exe Token: SeBackupPrivilege 636 vssvc.exe Token: SeRestorePrivilege 636 vssvc.exe Token: SeAuditPrivilege 636 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1280 4160 rundll32.exe 83 PID 4160 wrote to memory of 1280 4160 rundll32.exe 83 PID 4160 wrote to memory of 1280 4160 rundll32.exe 83 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\586c80559a50dc4a431d36caaf3c2694_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3084
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD59042713f628f964ab6792f07db086b94
SHA1bc92db9e2411aa5a008e88c280297ee888005dd3
SHA2566cab0a08e5a9af40efc0d79942a994ec0458d25958b7db16ad21678fe2a71104
SHA512045e75c436ef9cda1f42aeb25e2a86dba1795ae9e4097d98619e3fe51d08493ae38bbe9d50b4836afd1e862bf47db056fd32feac8269e8ca8ffadde23a341b9a