Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_8e8c0784a7fa025eeb3332aab465cee8

  • Size

    3.2MB

  • Sample

    250204-bxdrnazqdw

  • MD5

    8e8c0784a7fa025eeb3332aab465cee8

  • SHA1

    630b54fa8c38b9f75a7d6e9c03e27a18c70fc7f1

  • SHA256

    f39343ab3d3d8cd39693e43658ba10dcf599550735c8b641cb1db78d9fbdfeee

  • SHA512

    27f5e78935839c96b1c543999bd9899bbb35e50ae3687a967d79ddc0a9780fc136d2118c52b26cf084f62369d1c67a12009862997d8242ab46745b975c3f193f

  • SSDEEP

    49152:5a92EvPogfBv86nnIncBd9iGUjQnEMv+xZgasZuio5EMr/Mer2gyGRg1e9f/Ph8T:Q9jogFPnUq9i0Pv+xiZgHQeiUOe9pRgJ

Malware Config

Targets

    • Target

      JaffaCakes118_8e8c0784a7fa025eeb3332aab465cee8

    • Size

      3.2MB

    • MD5

      8e8c0784a7fa025eeb3332aab465cee8

    • SHA1

      630b54fa8c38b9f75a7d6e9c03e27a18c70fc7f1

    • SHA256

      f39343ab3d3d8cd39693e43658ba10dcf599550735c8b641cb1db78d9fbdfeee

    • SHA512

      27f5e78935839c96b1c543999bd9899bbb35e50ae3687a967d79ddc0a9780fc136d2118c52b26cf084f62369d1c67a12009862997d8242ab46745b975c3f193f

    • SSDEEP

      49152:5a92EvPogfBv86nnIncBd9iGUjQnEMv+xZgasZuio5EMr/Mer2gyGRg1e9f/Ph8T:Q9jogFPnUq9i0Pv+xiZgHQeiUOe9pRgJ

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks