Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_a47ac8579729c9196b042a9854d9c9fb
-
Size
518KB
-
Sample
250108-rrp6hatjfs
-
MD5
a47ac8579729c9196b042a9854d9c9fb
-
SHA1
0100d1ba06eebc095414b2187f8a7c630fd18c6a
-
SHA256
18db4581c44171ff15febaa0bc422c7b4a732500a346476dbebc5a8626033288
-
SHA512
e9f39e4731c20db7aed43b242c87976ff935c1a1d86fa06f77c4944679872c7ae43a4f65d1ca8f791832f4a40b51a544661f1c19b8b07ae72a748e351d941a12
-
SSDEEP
6144:9iTtxYG7vsO+LEfW3KSongYQytmWzLJ/QStdaMBjhCs5OPzaYmN:9iTAGbsOTO6SXctmMwACiOLbm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a47ac8579729c9196b042a9854d9c9fb.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
ct6s
liaquatsibtian.com
erisa.cymru
theultimateone.world
petpartner.info
edison-press.com
ryanmurazik.icu
bukasystems.com
kitsusimplex.com
qatarstyleart.com
brkhot.top
paehdfdtrujdfhs.xyz
createdbybonk.com
kuihoon.com
deathtocustomerservice.com
iotimb.com
greendiamond.pw
millionaireproducers.academy
websitemolsa.com
cbshomeimprovement.com
eardunder.quest
qdsrogijnsoiaha.xyz
winsimplebet8.com
nguyendinhmanh.online
straforkutu.online
jtbfunnels.xyz
sz-videocom.com
budteeshirts.com
teinkstash.com
aohuajz.com
awcarsales.com
thankful.love
yukselfirca.com
gamblz.com
prologuepr.com
georgemanuel.com
crewcamel.team
digesters.info
diosaempoderada.com
pobbs65.xyz
monoscribe.com
kelseycoding.com
lauertmouku.quest
techtalks-2021.com
zhi2021.com
bslf.xyz
socialdiseaseshop.com
bsnguyenhuunam.com
glozhair.com
pieko.net
hirenearyou.com
xoarin.online
beyondracula.com
hoshikoblog1.com
bigbet2298.com
pricetrust-shop.com
afiliadosilva.com
alrayangroups.com
sittingonforgis.online
fiitnutr.com
killeendirectconnection.com
princesstvchannels.com
belleshopdz.com
vanillanoir.com
homodont.com
metalzj.quest
Targets
-
-
Target
JaffaCakes118_a47ac8579729c9196b042a9854d9c9fb
-
Size
518KB
-
MD5
a47ac8579729c9196b042a9854d9c9fb
-
SHA1
0100d1ba06eebc095414b2187f8a7c630fd18c6a
-
SHA256
18db4581c44171ff15febaa0bc422c7b4a732500a346476dbebc5a8626033288
-
SHA512
e9f39e4731c20db7aed43b242c87976ff935c1a1d86fa06f77c4944679872c7ae43a4f65d1ca8f791832f4a40b51a544661f1c19b8b07ae72a748e351d941a12
-
SSDEEP
6144:9iTtxYG7vsO+LEfW3KSongYQytmWzLJ/QStdaMBjhCs5OPzaYmN:9iTAGbsOTO6SXctmMwACiOLbm
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1