Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_9a821211be9997f91e0e0db82f4cc339

  • Size

    300KB

  • Sample

    250117-3zmacsxpbl

  • MD5

    9a821211be9997f91e0e0db82f4cc339

  • SHA1

    244a54e9de4e03c142725d1cc87bdd30b2159b1b

  • SHA256

    2705c2eb9c46ec172744b3befa6eb27876b8d87fe1fd2483144929d3f57e8fc8

  • SHA512

    b7c6083c1f06984e8537b0bf7049ee66565486d77db49c514debbd2bfbb2bb9654b5d07cc0fa1d6fd5165a645e01559d91a2dc25125505acb0fac0053f0554de

  • SSDEEP

    3072:CQ9WjFtr5p+vF7DSmTWhlOwakeM4hsF7DSmTWhlOwake:JV+UWhlpakeeV+UWhlpake

Malware Config

Targets

    • Target

      JaffaCakes118_9a821211be9997f91e0e0db82f4cc339

    • Size

      300KB

    • MD5

      9a821211be9997f91e0e0db82f4cc339

    • SHA1

      244a54e9de4e03c142725d1cc87bdd30b2159b1b

    • SHA256

      2705c2eb9c46ec172744b3befa6eb27876b8d87fe1fd2483144929d3f57e8fc8

    • SHA512

      b7c6083c1f06984e8537b0bf7049ee66565486d77db49c514debbd2bfbb2bb9654b5d07cc0fa1d6fd5165a645e01559d91a2dc25125505acb0fac0053f0554de

    • SSDEEP

      3072:CQ9WjFtr5p+vF7DSmTWhlOwakeM4hsF7DSmTWhlOwake:JV+UWhlpakeeV+UWhlpake

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks