Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c941f52156a23b7d68e472985e7a20c8_JaffaCakes118

  • Size

    292KB

  • Sample

    240829-vrmxxsthqn

  • MD5

    c941f52156a23b7d68e472985e7a20c8

  • SHA1

    0abf6219aca6b805778b389a7fd1692a85d00b18

  • SHA256

    97e9d8fedf5738ce3f5ca2e84d3c250cc7e903ba286510fb4ed3a2f30d47813f

  • SHA512

    fc26638882acdc5646cbefb43972a9db92e06204a6765488066c9c7af1272683e0d0f346a8ae331b5a52e48c90e358124cfd30f9b1e25d68ab342507e6380ee1

  • SSDEEP

    6144:JYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5ehRsGT:S9BvctM85t35JPNJj2WzoRLQYRYzmYO8

Malware Config

Targets

    • Target

      c941f52156a23b7d68e472985e7a20c8_JaffaCakes118

    • Size

      292KB

    • MD5

      c941f52156a23b7d68e472985e7a20c8

    • SHA1

      0abf6219aca6b805778b389a7fd1692a85d00b18

    • SHA256

      97e9d8fedf5738ce3f5ca2e84d3c250cc7e903ba286510fb4ed3a2f30d47813f

    • SHA512

      fc26638882acdc5646cbefb43972a9db92e06204a6765488066c9c7af1272683e0d0f346a8ae331b5a52e48c90e358124cfd30f9b1e25d68ab342507e6380ee1

    • SSDEEP

      6144:JYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5ehRsGT:S9BvctM85t35JPNJj2WzoRLQYRYzmYO8

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Network Share Discovery

      Attempt to gather information on host network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks