Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
662e6b816a020e9ee266c64279925c97_JaffaCakes118
-
Size
84KB
-
Sample
241021-knk9taxbre
-
MD5
662e6b816a020e9ee266c64279925c97
-
SHA1
71b39ba774950b3df6c41f55d20c18d541eae281
-
SHA256
2566b2cc7454d5d2edd11fda0dc0c5b97179544bb928ddfb1c1c52f0085b5c70
-
SHA512
6711d320822b585e2829b43667ae647ab72be180fb9df125250ef05604a72a261e94fecdbf47d7527ad64e561a0ff651ede0471ec96f942333c6238cad27e3a7
-
SSDEEP
1536:3aJUOLywb7+pb699rQeSiAa7TkGpJeOZJuagC9+20zaB5fotZvb+msLAT3YDc0:MRxa8ZSziJeOLcCQ2osdSwkyX
Static task
static1
Behavioral task
behavioral1
Sample
662e6b816a020e9ee266c64279925c97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
662e6b816a020e9ee266c64279925c97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://fypse2u.info:1654/ero.php
http://crytili.info:1654/ero.php
Targets
-
-
Target
662e6b816a020e9ee266c64279925c97_JaffaCakes118
-
Size
84KB
-
MD5
662e6b816a020e9ee266c64279925c97
-
SHA1
71b39ba774950b3df6c41f55d20c18d541eae281
-
SHA256
2566b2cc7454d5d2edd11fda0dc0c5b97179544bb928ddfb1c1c52f0085b5c70
-
SHA512
6711d320822b585e2829b43667ae647ab72be180fb9df125250ef05604a72a261e94fecdbf47d7527ad64e561a0ff651ede0471ec96f942333c6238cad27e3a7
-
SSDEEP
1536:3aJUOLywb7+pb699rQeSiAa7TkGpJeOZJuagC9+20zaB5fotZvb+msLAT3YDc0:MRxa8ZSziJeOLcCQ2osdSwkyX
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3