Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237
-
Size
341KB
-
Sample
250210-k512lawray
-
MD5
d9c8053bc88efbb4505be98b4b7ac237
-
SHA1
0eab7bdb09337aae65da7b796db092fa8994dbef
-
SHA256
0048955cb905da6274967ee03a0dbce356c038752f58bf01049b9ce0b31f9bf0
-
SHA512
6a6217fc2b3beab306a85711c31135f71b57bb1ec2e0e5fca983b50552a8540f44ebaf360b621da9e268c841ba493a05ce2641a3b19b538e4be485c48041ed88
-
SSDEEP
6144:BfZ/nwzIhoZib9i0ju9BKVoEZUW1Dr9uSeqkHnb3qyYCpvg:BfpPOZiBiq3zxZg2wb3qMpvg
Behavioral task
behavioral1
Sample
JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_d9c8053bc88efbb4505be98b4b7ac237
-
Size
341KB
-
MD5
d9c8053bc88efbb4505be98b4b7ac237
-
SHA1
0eab7bdb09337aae65da7b796db092fa8994dbef
-
SHA256
0048955cb905da6274967ee03a0dbce356c038752f58bf01049b9ce0b31f9bf0
-
SHA512
6a6217fc2b3beab306a85711c31135f71b57bb1ec2e0e5fca983b50552a8540f44ebaf360b621da9e268c841ba493a05ce2641a3b19b538e4be485c48041ed88
-
SSDEEP
6144:BfZ/nwzIhoZib9i0ju9BKVoEZUW1Dr9uSeqkHnb3qyYCpvg:BfpPOZiBiq3zxZg2wb3qMpvg
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1