Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    47a91b5977ae37d569959af59a336c40_JaffaCakes118

  • Size

    859KB

  • Sample

    240715-bxqffssalq

  • MD5

    47a91b5977ae37d569959af59a336c40

  • SHA1

    e4657211489bfb52c32c83bae99a9b650292bda9

  • SHA256

    168724fb7e0800b37d13e77cb330269d8e14d148c42ad3f8187eaaa314b55634

  • SHA512

    2ed539ec166ba394c715662eccbc3aaaaa970929557c2b920e9112108297c26af02c014875032da36fc4165ba225fc97150c111225439e1abde876f26640bb30

  • SSDEEP

    24576:BYZ6wn7I5umaj2HQcb43MxpjtAHEhKnOBW:BYZn7IzaSHZU8jqkW

Malware Config

Targets

    • Target

      47a91b5977ae37d569959af59a336c40_JaffaCakes118

    • Size

      859KB

    • MD5

      47a91b5977ae37d569959af59a336c40

    • SHA1

      e4657211489bfb52c32c83bae99a9b650292bda9

    • SHA256

      168724fb7e0800b37d13e77cb330269d8e14d148c42ad3f8187eaaa314b55634

    • SHA512

      2ed539ec166ba394c715662eccbc3aaaaa970929557c2b920e9112108297c26af02c014875032da36fc4165ba225fc97150c111225439e1abde876f26640bb30

    • SSDEEP

      24576:BYZ6wn7I5umaj2HQcb43MxpjtAHEhKnOBW:BYZn7IzaSHZU8jqkW

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks