Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
99654b84500c9d0bb3caa977a17b37b5_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99654b84500c9d0bb3caa977a17b37b5_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
99654b84500c9d0bb3caa977a17b37b5_JaffaCakes118.dll
-
Size
114KB
-
MD5
99654b84500c9d0bb3caa977a17b37b5
-
SHA1
73700b03f83c49aa70f05d55a3d32509c5ef4669
-
SHA256
839ea289781fd3aff964d3f375f04a160148a65291673705958e0ad859370d0a
-
SHA512
bc1ede3e3cee45054a5aa8bc01350e1dcc3809884af15de97312c6596d58d36958e96d742923ac02d7dd2942bc66a888e332bc17cfc4a778b649fdb0542a9ba7
-
SSDEEP
1536:t+UsJjrePaONg5khnnI5drFqgNNtrpNOxXICS4AR4YMPlpPlckW8MRUmjC1e:t0rLOiqhnufNNtdxvWZckFmuY
Malware Config
Extracted
C:\Users\jri3b3v3-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/0587798E459FFB01
http://decryptor.cc/0587798E459FFB01
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\D: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\T: rundll32.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File created \??\c:\program files\jri3b3v3-readme.txt rundll32.exe File opened for modification \??\c:\program files\ApproveDisable.7z rundll32.exe File opened for modification \??\c:\program files\AssertClear.xml rundll32.exe File opened for modification \??\c:\program files\CopyAdd.mp3 rundll32.exe File opened for modification \??\c:\program files\DisableBackup.tiff rundll32.exe File opened for modification \??\c:\program files\SelectRequest.htm rundll32.exe File opened for modification \??\c:\program files\BlockConnect.rtf rundll32.exe File opened for modification \??\c:\program files\DisconnectConnect.emz rundll32.exe File opened for modification \??\c:\program files\RenameInvoke.raw rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\jri3b3v3-readme.txt rundll32.exe File opened for modification \??\c:\program files\AssertStop.xlsm rundll32.exe File opened for modification \??\c:\program files\MountSearch.mp2v rundll32.exe File opened for modification \??\c:\program files\UndoInvoke.wma rundll32.exe File opened for modification \??\c:\program files\WaitRead.mov rundll32.exe File opened for modification \??\c:\program files\WatchRestore.snd rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\jri3b3v3-readme.txt rundll32.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\jri3b3v3-readme.txt rundll32.exe File created \??\c:\program files (x86)\jri3b3v3-readme.txt rundll32.exe File opened for modification \??\c:\program files\CloseDismount.mpeg2 rundll32.exe File opened for modification \??\c:\program files\CompleteTest.ppt rundll32.exe File opened for modification \??\c:\program files\MountOpen.i64 rundll32.exe File opened for modification \??\c:\program files\RevokeMeasure.mov rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2164 rundll32.exe 2940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2164 rundll32.exe Token: SeDebugPrivilege 2940 powershell.exe Token: SeBackupPrivilege 1744 vssvc.exe Token: SeRestorePrivilege 1744 vssvc.exe Token: SeAuditPrivilege 1744 vssvc.exe Token: SeTakeOwnershipPrivilege 2164 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2352 wrote to memory of 2164 2352 rundll32.exe 28 PID 2164 wrote to memory of 2940 2164 rundll32.exe 29 PID 2164 wrote to memory of 2940 2164 rundll32.exe 29 PID 2164 wrote to memory of 2940 2164 rundll32.exe 29 PID 2164 wrote to memory of 2940 2164 rundll32.exe 29 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99654b84500c9d0bb3caa977a17b37b5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99654b84500c9d0bb3caa977a17b37b5_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1880
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD50d2e58af07e6a44644edbf22b72c2f3e
SHA1033584cb3f54254284bee182a920314062265eb9
SHA2565873b05cee622e13bc4b76e8f1e53e94231d57816f7df17f18bc193380b9fe08
SHA51205c0ef3e5973fdc15d60394f3417f466584dcb942b89dc92a296def3175d67916378532b60c1975a91f4286b90e57b085c4424ed69eb339630c70b520421cbd4