Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_441cbd5b996da226af3b22de9536e52c
-
Size
284KB
-
Sample
250303-cx5e2stvg1
-
MD5
441cbd5b996da226af3b22de9536e52c
-
SHA1
135f990985bf4dee12be8d5c9541c631fca9ebb9
-
SHA256
a3bffda191ed59e4dba263ffad94c780865aefc7eb7991a6c312fff697ce521d
-
SHA512
ce1fb932e056046ff00b0dd8d9947f9499280347c4a087d018ba43c8fa42eded20d9acb90ac66377b1c1a81be1a49de62a7cdeb43bd7f7000458747cf2c56178
-
SSDEEP
6144:Q3bdXPx3ydIKCC0ef//uXltKc+LVsz9b8TNlrWuW62BnDf6RhD:GydFeCXuLKcCVsz6/CuW6IL6DD
Behavioral task
behavioral1
Sample
JaffaCakes118_441cbd5b996da226af3b22de9536e52c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_441cbd5b996da226af3b22de9536e52c.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
JaffaCakes118_441cbd5b996da226af3b22de9536e52c
-
Size
284KB
-
MD5
441cbd5b996da226af3b22de9536e52c
-
SHA1
135f990985bf4dee12be8d5c9541c631fca9ebb9
-
SHA256
a3bffda191ed59e4dba263ffad94c780865aefc7eb7991a6c312fff697ce521d
-
SHA512
ce1fb932e056046ff00b0dd8d9947f9499280347c4a087d018ba43c8fa42eded20d9acb90ac66377b1c1a81be1a49de62a7cdeb43bd7f7000458747cf2c56178
-
SSDEEP
6144:Q3bdXPx3ydIKCC0ef//uXltKc+LVsz9b8TNlrWuW62BnDf6RhD:GydFeCXuLKcCVsz6/CuW6IL6DD
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Windows security modification
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1