Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237

  • Size

    341KB

  • Sample

    250210-k512lawray

  • MD5

    d9c8053bc88efbb4505be98b4b7ac237

  • SHA1

    0eab7bdb09337aae65da7b796db092fa8994dbef

  • SHA256

    0048955cb905da6274967ee03a0dbce356c038752f58bf01049b9ce0b31f9bf0

  • SHA512

    6a6217fc2b3beab306a85711c31135f71b57bb1ec2e0e5fca983b50552a8540f44ebaf360b621da9e268c841ba493a05ce2641a3b19b538e4be485c48041ed88

  • SSDEEP

    6144:BfZ/nwzIhoZib9i0ju9BKVoEZUW1Dr9uSeqkHnb3qyYCpvg:BfpPOZiBiq3zxZg2wb3qMpvg

Malware Config

Targets

    • Target

      JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237

    • Size

      341KB

    • MD5

      d9c8053bc88efbb4505be98b4b7ac237

    • SHA1

      0eab7bdb09337aae65da7b796db092fa8994dbef

    • SHA256

      0048955cb905da6274967ee03a0dbce356c038752f58bf01049b9ce0b31f9bf0

    • SHA512

      6a6217fc2b3beab306a85711c31135f71b57bb1ec2e0e5fca983b50552a8540f44ebaf360b621da9e268c841ba493a05ce2641a3b19b538e4be485c48041ed88

    • SSDEEP

      6144:BfZ/nwzIhoZib9i0ju9BKVoEZUW1Dr9uSeqkHnb3qyYCpvg:BfpPOZiBiq3zxZg2wb3qMpvg

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks