Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    3383d302b05d28bc170a5b64a81549d2_JaffaCakes118

  • Size

    255KB

  • Sample

    240710-geetwszcqp

  • MD5

    3383d302b05d28bc170a5b64a81549d2

  • SHA1

    efe9207b79095f0dfba98c3a8b9f74c1cfbe42db

  • SHA256

    763f21e8ee3f12d5b44df48d69cb6b8834806f04cdc8c051cb04ada437cb7299

  • SHA512

    54f0e9dc5c35166c1dc2087f4826f28e405a92c00f3ba04558f1c47b4c7eacbbe56e511a36e86b4430af34c6b026a48340612a45b0b479fbc88af2c7505afa12

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJe:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIr

Malware Config

Targets

    • Target

      3383d302b05d28bc170a5b64a81549d2_JaffaCakes118

    • Size

      255KB

    • MD5

      3383d302b05d28bc170a5b64a81549d2

    • SHA1

      efe9207b79095f0dfba98c3a8b9f74c1cfbe42db

    • SHA256

      763f21e8ee3f12d5b44df48d69cb6b8834806f04cdc8c051cb04ada437cb7299

    • SHA512

      54f0e9dc5c35166c1dc2087f4826f28e405a92c00f3ba04558f1c47b4c7eacbbe56e511a36e86b4430af34c6b026a48340612a45b0b479fbc88af2c7505afa12

    • SSDEEP

      3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJe:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIr

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks