Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
-
Size
135KB
-
MD5
e95fde3755bfdc750ed7951ec8e39507
-
SHA1
9860efa2f66d70207bb994bec6b444e13eac8f7d
-
SHA256
f8c73b12c29665c5c88bd7ce4ab9b609c8b82961f22f3a059a6b514149ea2f6d
-
SHA512
b7bc3697a2f9b6cc14a5d069b4fef490956a88879a9ea0b4c390b121e5c53fc4bcb807e513dce04b6ce688c674becdefcf0846a80c6784c7e198c739aa9da85d
-
SSDEEP
3072:T6YDfgKvdZYYMT7hOLiQ1JkeqXBhS9M9I7eHlZZly8C9:TN4KvcYqcWsJkeSSOak6n9
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ndisrd\ImagePath = "system32\\DRIVERS\\ndisrd.sys" e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2276 drvsign.exe 2604 snetcfg.exe -
Loads dropped DLL 4 IoCs
pid Process 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{1df79c56-8609-3a41-10a0-255058ccd210}\SET37C3.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{1df79c56-8609-3a41-10a0-255058ccd210}\SET37C3.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{1df79c56-8609-3a41-10a0-255058ccd210}\ndisrd.inf DrvInst.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log snetcfg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2604 snetcfg.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe Token: SeRestorePrivilege 2516 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2276 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2276 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2276 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2276 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 28 PID 2168 wrote to memory of 2604 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2604 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2604 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2604 2168 e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2516 2576 DrvInst.exe 33 PID 2576 wrote to memory of 2516 2576 DrvInst.exe 33 PID 2576 wrote to memory of 2516 2576 DrvInst.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\drvsign.exe"drvsign.exe"2⤵
- Executes dropped EXE
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\snetcfg.exe"snetcfg.exe" -v -l ndisrd.inf -m ndisrd_m.inf -c s -i nt_ndisrd2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5add1c8f-fcc6-7982-280e-cd0223ba2b1d}\ndisrd.inf" "9" "6e0e7c7cf" "0000000000000558" "WinSta0\Default" "0000000000000398" "208" "C:\Users\Admin\AppData\Local\Temp"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 10 Global\{145aef9e-e9c1-33c6-aa5d-4436e6d29436} Global\{29a3b370-0d3b-42d8-4d9f-490d29c24356} C:\Windows\System32\DriverStore\Temp\{1df79c56-8609-3a41-10a0-255058ccd210}\ndisrd.inf2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5353c49f48000ca566f228e3315ac8234
SHA15a3926d58d62a1e21e0811821808a864e1f0ce7c
SHA25616d40dabb55453cfea72d585bc3bfd30f08f45c8a5c3382881be1e0d4c9e009b
SHA512235389aab585b64f3f8db2366b2399dab787e7600a28ec9a6f2708bc06e60060d39fe7d32ddb6d62df238038fbdb5fe432646804120b7ee423253e768c792f47
-
Filesize
76KB
MD51c5de8836a71c13437b4718efddf3422
SHA16903cb9baa15908c3f6d363f71e609c787e30974
SHA2560e1dae071d4712c32c4d374638644a888c32d750f6289fcffad5dcf0dd2cfc8b
SHA5120a97da0422ebe981bb33441565867ff4b53ccc08d7b680242d1e082438205303ab94d9becc43a433e4f7274e02da8b5370d4b0945c0ac6a323a23329093299ba
-
Filesize
13KB
MD588191a960f5e5e32712a98db95c21ffa
SHA11762de02a71fd4e0a34825be44b4e3be5ae47d5c
SHA25632d96c634f4a97e648b467a9e040e90c854badb0424c6f8638621ab1501b6aab
SHA512577187fdc00589b69a04afba419750f9303a312965bc715034e5e1045880d6c65374a79dc696633c98695aaf7f9193ad28c8acc36c841f594aea33e2478a1580