Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_5ffe82159a6e2c099a8dfe5a37574c74

  • Size

    2.9MB

  • Sample

    250130-hnclkazpek

  • MD5

    5ffe82159a6e2c099a8dfe5a37574c74

  • SHA1

    02b1c743bd5e6f3412ff63eddfb79f0e4d4f6498

  • SHA256

    d544bb4d411e66797f4e3764b62bb97bf79aee7c458c0da1c665a69d81802a5e

  • SHA512

    6d65c3a2bdf76c9b8b18e5ecac36556823b918039728a2e7ed89779592bfeadeff3aa6469ac9714e7ae44be7b44f84f4bc1f4b721b428664f94f5cebdf19a441

  • SSDEEP

    49152:5aUzZxhW8oPZdoaknsXph0Q66odrSEOnnwaJVAmKCY0NEsfi35krR42cm461Z9TW:QUzZ7cssXpW6ErtOnwaJVAjCY0WdpuNs

Malware Config

Targets

    • Target

      JaffaCakes118_5ffe82159a6e2c099a8dfe5a37574c74

    • Size

      2.9MB

    • MD5

      5ffe82159a6e2c099a8dfe5a37574c74

    • SHA1

      02b1c743bd5e6f3412ff63eddfb79f0e4d4f6498

    • SHA256

      d544bb4d411e66797f4e3764b62bb97bf79aee7c458c0da1c665a69d81802a5e

    • SHA512

      6d65c3a2bdf76c9b8b18e5ecac36556823b918039728a2e7ed89779592bfeadeff3aa6469ac9714e7ae44be7b44f84f4bc1f4b721b428664f94f5cebdf19a441

    • SSDEEP

      49152:5aUzZxhW8oPZdoaknsXph0Q66odrSEOnnwaJVAmKCY0NEsfi35krR42cm461Z9TW:QUzZ7cssXpW6ErtOnwaJVAjCY0WdpuNs

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks