Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_0aac6f3bc2324aa1e4fb548117904bdb
-
Size
420KB
-
Sample
250220-j3912szrgp
-
MD5
0aac6f3bc2324aa1e4fb548117904bdb
-
SHA1
28db5bc8fca2baa3ee40c912575ff9eb9ce5c094
-
SHA256
37cbbbdcf8cb64cbd9c166fe0d7ad96fb998564028779841fec680d3a94db310
-
SHA512
944102d333ff7e82ef73e258cf698cbac3488ba011cb475c37d50e7a5578d5947242c3a0731ad5eb871a1e6228faa97341a4d5aaca1a47b11c53d9a625f19820
-
SSDEEP
6144:txdgGH6aU1CJNUSNXgB+3+PBhESZPu59chmAawYBLHp4t5mVHnbOd:t/aCHXeB8YhESZWXomAvYBLit5gOd
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0aac6f3bc2324aa1e4fb548117904bdb.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0aac6f3bc2324aa1e4fb548117904bdb.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0aac6f3bc2324aa1e4fb548117904bdb
-
Size
420KB
-
MD5
0aac6f3bc2324aa1e4fb548117904bdb
-
SHA1
28db5bc8fca2baa3ee40c912575ff9eb9ce5c094
-
SHA256
37cbbbdcf8cb64cbd9c166fe0d7ad96fb998564028779841fec680d3a94db310
-
SHA512
944102d333ff7e82ef73e258cf698cbac3488ba011cb475c37d50e7a5578d5947242c3a0731ad5eb871a1e6228faa97341a4d5aaca1a47b11c53d9a625f19820
-
SSDEEP
6144:txdgGH6aU1CJNUSNXgB+3+PBhESZPu59chmAawYBLHp4t5mVHnbOd:t/aCHXeB8YhESZWXomAvYBLit5gOd
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1