Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/03/2025, 15:35
250301-s1aylsvmx9 801/03/2025, 14:59
250301-sc3nqatrz3 1017/01/2025, 11:59
250117-n5rdyawnay 320/12/2024, 21:57
241220-1vd23svrbr 818/12/2024, 19:52
241218-ylw57azrfn 1018/12/2024, 19:51
241218-ylabeszrek 318/12/2024, 19:31
241218-x8fw2sypez 818/12/2024, 19:27
241218-x6k3zsypaw 318/12/2024, 19:27
241218-x54hyazlfn 3General
-
Target
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118
-
Size
93KB
-
Sample
250301-sc3nqatrz3
-
MD5
fcd1cdfe358c3b7c95e10cf72dbf727f
-
SHA1
7c5c487471db6b1702085fd880a931a819baa264
-
SHA256
d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae
-
SHA512
30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6
-
SSDEEP
1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D
Behavioral task
behavioral1
Sample
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118.pdf
Resource
win10ltsc2021-20250218-en
Malware Config
Targets
-
-
Target
fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118
-
Size
93KB
-
MD5
fcd1cdfe358c3b7c95e10cf72dbf727f
-
SHA1
7c5c487471db6b1702085fd880a931a819baa264
-
SHA256
d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae
-
SHA512
30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6
-
SSDEEP
1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D
-
UAC bypass
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2