Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118

  • Size

    949KB

  • Sample

    240819-mgw4vascjp

  • MD5

    aaa3b6e224b12217592d65a7ffc844a2

  • SHA1

    4b9c8271249280fe464bcb93ae45217b6fa43405

  • SHA256

    437ffb21e0a393b3c6893183cb21bf35dad048b8bdbfb5f59aa281f6f035b4cf

  • SHA512

    f3e6cde83e98227a92c1be9d347b0f50a777f9eb838ed2e00e92401b66e655733dc429685b2dabf263e420ecbfabe71bfd4c3116fb1e67e5b5533ad0262f4aaa

  • SSDEEP

    12288:Fy30sHmR38KxpRUSTfOSpULxzMg21C62ZNAR8PwP0gxSn2FCCKEWfG0tDNH5Drp2:F20VRtUQHUtzMIveHvW2xK1OyD19pL

Malware Config

Targets

    • Target

      aaa3b6e224b12217592d65a7ffc844a2_JaffaCakes118

    • Size

      949KB

    • MD5

      aaa3b6e224b12217592d65a7ffc844a2

    • SHA1

      4b9c8271249280fe464bcb93ae45217b6fa43405

    • SHA256

      437ffb21e0a393b3c6893183cb21bf35dad048b8bdbfb5f59aa281f6f035b4cf

    • SHA512

      f3e6cde83e98227a92c1be9d347b0f50a777f9eb838ed2e00e92401b66e655733dc429685b2dabf263e420ecbfabe71bfd4c3116fb1e67e5b5533ad0262f4aaa

    • SSDEEP

      12288:Fy30sHmR38KxpRUSTfOSpULxzMg21C62ZNAR8PwP0gxSn2FCCKEWfG0tDNH5Drp2:F20VRtUQHUtzMIveHvW2xK1OyD19pL

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks