Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    69f5d47856a236e062f07142c98fe7feJaffaCakes118

  • Size

    512KB

  • Sample

    240526-ff7qmagc57

  • MD5

    69f5d47856a236e062f07142c98fe7fe

  • SHA1

    05f68d26f87700fe6d205be181d9419bacf1d5d1

  • SHA256

    914dd25472fe32554ed5147eeee0930b2ee42750257cffee9fdc72d0387c622f

  • SHA512

    51ca4db9b7be7ae841a58b4304aa06610521e3dd15428013852bdc36f6679a85f925fbd0cc11885691b72c84fbb6c3632e2680746aadb90becbf2990795187d7

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm54

Malware Config

Targets

    • Target

      69f5d47856a236e062f07142c98fe7feJaffaCakes118

    • Size

      512KB

    • MD5

      69f5d47856a236e062f07142c98fe7fe

    • SHA1

      05f68d26f87700fe6d205be181d9419bacf1d5d1

    • SHA256

      914dd25472fe32554ed5147eeee0930b2ee42750257cffee9fdc72d0387c622f

    • SHA512

      51ca4db9b7be7ae841a58b4304aa06610521e3dd15428013852bdc36f6679a85f925fbd0cc11885691b72c84fbb6c3632e2680746aadb90becbf2990795187d7

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm54

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.