Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 05:53

General

  • Target

    e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe

  • Size

    135KB

  • MD5

    e95fde3755bfdc750ed7951ec8e39507

  • SHA1

    9860efa2f66d70207bb994bec6b444e13eac8f7d

  • SHA256

    f8c73b12c29665c5c88bd7ce4ab9b609c8b82961f22f3a059a6b514149ea2f6d

  • SHA512

    b7bc3697a2f9b6cc14a5d069b4fef490956a88879a9ea0b4c390b121e5c53fc4bcb807e513dce04b6ce688c674becdefcf0846a80c6784c7e198c739aa9da85d

  • SSDEEP

    3072:T6YDfgKvdZYYMT7hOLiQ1JkeqXBhS9M9I7eHlZZly8C9:TN4KvcYqcWsJkeSSOak6n9

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 10 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Drops file in System32 directory
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\drvsign.exe
      "drvsign.exe"
      2⤵
      • Executes dropped EXE
      PID:2876
    • C:\Users\Admin\AppData\Local\Temp\snetcfg.exe
      "snetcfg.exe" -v -l ndisrd.inf -m ndisrd_m.inf -c s -i nt_ndisrd
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2040
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{9fa573fd-0b63-a942-8049-4c000dddb688}\ndisrd.inf" "9" "4e0e7c7cf" "0000000000000134" "WinSta0\Default" "0000000000000158" "208" "C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1432
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{6c1134dd-9496-034d-b311-c6a0ec26585e}\ndisrd_m.inf" "9" "42a2dd9fb" "0000000000000158" "WinSta0\Default" "0000000000000160" "208" "C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\drvsign.exe

    Filesize

    76KB

    MD5

    1c5de8836a71c13437b4718efddf3422

    SHA1

    6903cb9baa15908c3f6d363f71e609c787e30974

    SHA256

    0e1dae071d4712c32c4d374638644a888c32d750f6289fcffad5dcf0dd2cfc8b

    SHA512

    0a97da0422ebe981bb33441565867ff4b53ccc08d7b680242d1e082438205303ab94d9becc43a433e4f7274e02da8b5370d4b0945c0ac6a323a23329093299ba

  • C:\Users\Admin\AppData\Local\Temp\ndisrd.inf

    Filesize

    3KB

    MD5

    353c49f48000ca566f228e3315ac8234

    SHA1

    5a3926d58d62a1e21e0811821808a864e1f0ce7c

    SHA256

    16d40dabb55453cfea72d585bc3bfd30f08f45c8a5c3382881be1e0d4c9e009b

    SHA512

    235389aab585b64f3f8db2366b2399dab787e7600a28ec9a6f2708bc06e60060d39fe7d32ddb6d62df238038fbdb5fe432646804120b7ee423253e768c792f47

  • C:\Users\Admin\AppData\Local\Temp\ndisrd_m.inf

    Filesize

    1KB

    MD5

    7b80c9479b37b499544b74ecf5b83331

    SHA1

    5bf31c66872d851c779a89aaa56eba3153005ed3

    SHA256

    3059d609beab99a06ac721eedd3d6bcba35f91a38f3c9cc362fd21002c13fedb

    SHA512

    6f36d763ac019da65f2ec910af7404912bf36e590e9f36944d09e1c518cca4c14f5a816d8702b318792c05be2363a7b1b65d47b288444c90b4ceeb957a091157

  • C:\Users\Admin\AppData\Local\Temp\snetcfg.exe

    Filesize

    13KB

    MD5

    88191a960f5e5e32712a98db95c21ffa

    SHA1

    1762de02a71fd4e0a34825be44b4e3be5ae47d5c

    SHA256

    32d96c634f4a97e648b467a9e040e90c854badb0424c6f8638621ab1501b6aab

    SHA512

    577187fdc00589b69a04afba419750f9303a312965bc715034e5e1045880d6c65374a79dc696633c98695aaf7f9193ad28c8acc36c841f594aea33e2478a1580

  • memory/2524-0-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2524-1-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2524-2-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2524-3-0x00000000021D0000-0x0000000002241000-memory.dmp

    Filesize

    452KB

  • memory/2524-4-0x00000000021D5000-0x00000000021D6000-memory.dmp

    Filesize

    4KB

  • memory/2524-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2524-44-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2524-45-0x00000000021D0000-0x0000000002241000-memory.dmp

    Filesize

    452KB