Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_285cebbc3f15e5f98fd569c88ef88b60
-
Size
292KB
-
Sample
250226-y5c7esslx3
-
MD5
285cebbc3f15e5f98fd569c88ef88b60
-
SHA1
63e29c8ef0595908a0b3b97fc20a6cab80640a93
-
SHA256
5600f1f50e6971e997b489a53a9741c2e474606739fa9482fbc847cbccb92912
-
SHA512
1544c4dee90ac72e494a1e55c54dad63cf8fbe90731bec8601fb2925cecfc2709399bd3d12c868828b5ae9ee3821c68c179480e44787f665ac020cd0272d87fc
-
SSDEEP
6144:cvEF2U+T6i5LirrllHy4HUcMQY6nyLTepUZPun0CX:uEFN+T5xYrllrU7QY6yLTEnh
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_285cebbc3f15e5f98fd569c88ef88b60.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_285cebbc3f15e5f98fd569c88ef88b60.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_285cebbc3f15e5f98fd569c88ef88b60
-
Size
292KB
-
MD5
285cebbc3f15e5f98fd569c88ef88b60
-
SHA1
63e29c8ef0595908a0b3b97fc20a6cab80640a93
-
SHA256
5600f1f50e6971e997b489a53a9741c2e474606739fa9482fbc847cbccb92912
-
SHA512
1544c4dee90ac72e494a1e55c54dad63cf8fbe90731bec8601fb2925cecfc2709399bd3d12c868828b5ae9ee3821c68c179480e44787f665ac020cd0272d87fc
-
SSDEEP
6144:cvEF2U+T6i5LirrllHy4HUcMQY6nyLTepUZPun0CX:uEFN+T5xYrllrU7QY6yLTEnh
-
Bazaloader family
-
Detects BazaLoader malware
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests - JaffaCakes118.
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9