Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 06:16

General

  • Target

    72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    72e36e34a1f4e269d07d108d82bdf2a0

  • SHA1

    89b371c36fe9738362ee2d0cc104fdb202314826

  • SHA256

    c79a261b857b6139662023863d2f65f39f0e13720ffe557d410471565b6407a0

  • SHA512

    f333b741fd2e3b773afb6b5c2de91854f58cd439602264e7c197eaac074e5063e42b1c86e98e266fd0d46de410862087d788e834776ad2dcc567b9647a67e624

  • SSDEEP

    49152:1voJUoKj1+9KXy+GxnekmZkEMbdUaKLBOihl/3p0842/YKEkpEQ3:1vol84oIepkEMZ4cQl/3p0epN

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\72e36e34a1f4e269d07d108d82bdf2a0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe
      "C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe" /q /c start /b /d "C:\Users\Admin\AppData\Roaming\zarchive" zarchive.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Roaming\zarchive\zarchive.exe
        zarchive.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Users\Admin\AppData\Roaming\zarchive\zarchive.exe
          zarchive.exe
          4⤵
          • Checks BIOS information in registry
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1040
            5⤵
            • Program crash
            PID:2204
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3976 -ip 3976
    1⤵
      PID:1984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsmA376.tmp\System.dll

      Filesize

      10KB

      MD5

      cb589d300ffc4e38183880a476eb5aee

      SHA1

      3c7828ebabbd53305ca7dead9d75858a87cfaf71

      SHA256

      b40bf86e3522e4504dca095721040d1b143438076a5d299210b654f38f86aabf

      SHA512

      c3b453c997a8a9fecb2decfe65bdc2810e79ac81b7e9dfa960c05efecd3016fe8f3f20e06b49abdc4112f8e948856ea0fbaccd2c8f5e45f03242d839ccb1cd1e

    • C:\Users\Admin\AppData\Local\Temp\nsmA376.tmp\VPatch.dll

      Filesize

      7KB

      MD5

      b2a8be8de58cf1273d0992fd5da7cb2f

      SHA1

      af4fa16c2bc91a91b72de0e636dafcdc2f894044

      SHA256

      6b161a1e90516f1f53e69aec387b5f59b2bdedf19cb4eee6f7ade2e82c0a7173

      SHA512

      b1b0bd40d26d581a0056cc4cece07a929d28e831209017ee3ebfc3d429409842ef3720c0b6ebbd26966e7d647a8da389e317e1152041ca5a0dc78528d733c151

    • C:\Users\Admin\AppData\Roaming\zarchive\cwd.exe

      Filesize

      386KB

      MD5

      53aeeaf4e7f12b8e91b3a474cafb4115

      SHA1

      b90f3887c035b47fde7280bcec91ce273fbc8f7f

      SHA256

      c95c0dcebfcb96020248be1dbe04752acdca6971ed81b308dba302b713882d29

      SHA512

      6ef041f581046dddc58608c9a8ff800eaf4355328ec5132ecc1345fdfbae97b04a88f2b4ab26989a33c4bf2e24f81cb0b9339a58d4e54f6831dd5cab78f42fc1

    • C:\Users\Admin\AppData\Roaming\zarchive\zarchive.exe

      Filesize

      1.2MB

      MD5

      61cb6e69204243334d35904508900c11

      SHA1

      6e4e580f018c169ce5cf7355e863ac36559fdf4d

      SHA256

      7bfd318a1c2aa5815f27ec63ce8dc7292c824d549a83c4ad6f5801b44e26e329

      SHA512

      0bcfab91cf9bbeaf0c37e3c44217e42e6bec049990d289bc75a8d422decb43d8e20f9bf08a827d127ac922de8291f369e00d8b741efe1014acf8ac9ae7f808ee

    • memory/3976-107-0x0000000002250000-0x0000000002355000-memory.dmp

      Filesize

      1.0MB

    • memory/3976-101-0x0000000002250000-0x0000000002355000-memory.dmp

      Filesize

      1.0MB

    • memory/3976-109-0x0000000002250000-0x0000000002355000-memory.dmp

      Filesize

      1.0MB

    • memory/3976-110-0x0000000002250000-0x0000000002355000-memory.dmp

      Filesize

      1.0MB

    • memory/3976-111-0x0000000000820000-0x00000000009E8000-memory.dmp

      Filesize

      1.8MB

    • memory/4144-96-0x0000000000820000-0x00000000009E8000-memory.dmp

      Filesize

      1.8MB

    • memory/4144-112-0x0000000000820000-0x00000000009E8000-memory.dmp

      Filesize

      1.8MB