Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    4161be02a8851d5d6e998c26484cf32c_JaffaCakes118

  • Size

    1.7MB

  • Sample

    241013-w2kqzs1ckh

  • MD5

    4161be02a8851d5d6e998c26484cf32c

  • SHA1

    975f84b0af0acbcdfd162412debff0ad0acbccf2

  • SHA256

    d9a61b60685a682cbb1687fd6700cffc9ce9d97520abedec34ef7510364f1d2f

  • SHA512

    c8f8b4b9f904187662cb1b7a5fc038e87576143f636b33f481fb14da9619657bc2f784a16f4d1ef245e0790e152b8959000bfabced60ddbe3afebf9999212de8

  • SSDEEP

    6144:DX5BL26jUkbAzL44Xn095y7pdUn0PS3qnfMFad1SyeY0MIXh4r8gpVj:DzLNUbQ4k9M7HOV3in05aFp

Malware Config

Targets

    • Target

      4161be02a8851d5d6e998c26484cf32c_JaffaCakes118

    • Size

      1.7MB

    • MD5

      4161be02a8851d5d6e998c26484cf32c

    • SHA1

      975f84b0af0acbcdfd162412debff0ad0acbccf2

    • SHA256

      d9a61b60685a682cbb1687fd6700cffc9ce9d97520abedec34ef7510364f1d2f

    • SHA512

      c8f8b4b9f904187662cb1b7a5fc038e87576143f636b33f481fb14da9619657bc2f784a16f4d1ef245e0790e152b8959000bfabced60ddbe3afebf9999212de8

    • SSDEEP

      6144:DX5BL26jUkbAzL44Xn095y7pdUn0PS3qnfMFad1SyeY0MIXh4r8gpVj:DzLNUbQ4k9M7HOV3in05aFp

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks