Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 06:16

General

  • Target

    72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    72e36e34a1f4e269d07d108d82bdf2a0

  • SHA1

    89b371c36fe9738362ee2d0cc104fdb202314826

  • SHA256

    c79a261b857b6139662023863d2f65f39f0e13720ffe557d410471565b6407a0

  • SHA512

    f333b741fd2e3b773afb6b5c2de91854f58cd439602264e7c197eaac074e5063e42b1c86e98e266fd0d46de410862087d788e834776ad2dcc567b9647a67e624

  • SSDEEP

    49152:1voJUoKj1+9KXy+GxnekmZkEMbdUaKLBOihl/3p0842/YKEkpEQ3:1vol84oIepkEMZ4cQl/3p0epN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe
      "C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe" /q /c start /b /d "C:\Users\Admin\AppData\Roaming\zarchive" zarchive.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe

    Filesize

    386KB

    MD5

    53aeeaf4e7f12b8e91b3a474cafb4115

    SHA1

    b90f3887c035b47fde7280bcec91ce273fbc8f7f

    SHA256

    c95c0dcebfcb96020248be1dbe04752acdca6971ed81b308dba302b713882d29

    SHA512

    6ef041f581046dddc58608c9a8ff800eaf4355328ec5132ecc1345fdfbae97b04a88f2b4ab26989a33c4bf2e24f81cb0b9339a58d4e54f6831dd5cab78f42fc1

  • \Users\Admin\AppData\Local\Temp\nsj140F.tmp\System.dll

    Filesize

    10KB

    MD5

    cb589d300ffc4e38183880a476eb5aee

    SHA1

    3c7828ebabbd53305ca7dead9d75858a87cfaf71

    SHA256

    b40bf86e3522e4504dca095721040d1b143438076a5d299210b654f38f86aabf

    SHA512

    c3b453c997a8a9fecb2decfe65bdc2810e79ac81b7e9dfa960c05efecd3016fe8f3f20e06b49abdc4112f8e948856ea0fbaccd2c8f5e45f03242d839ccb1cd1e

  • \Users\Admin\AppData\Local\Temp\nsj140F.tmp\VPatch.dll

    Filesize

    7KB

    MD5

    b2a8be8de58cf1273d0992fd5da7cb2f

    SHA1

    af4fa16c2bc91a91b72de0e636dafcdc2f894044

    SHA256

    6b161a1e90516f1f53e69aec387b5f59b2bdedf19cb4eee6f7ade2e82c0a7173

    SHA512

    b1b0bd40d26d581a0056cc4cece07a929d28e831209017ee3ebfc3d429409842ef3720c0b6ebbd26966e7d647a8da389e317e1152041ca5a0dc78528d733c151

  • memory/2692-86-0x00000000020A0000-0x00000000020A1000-memory.dmp

    Filesize

    4KB