Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3ZoraraVVVER2.8.zip
windows11-21h2-x64
1ZoraraUI.deps.json
windows11-21h2-x64
3ZoraraUI.r...g.json
windows11-21h2-x64
3bin/Monaco...in.css
windows11-21h2-x64
3settings.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/...et.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/..._1.txt
windows11-21h2-x64
3workspace/..._2.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/...tefile
windows11-21h2-x64
1workspace/...le.txt
windows11-21h2-x64
3workspace/...29.txt
windows11-21h2-x64
3workspace/...22.lua
windows11-21h2-x64
3workspace/...ed.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/...le.txt
windows11-21h2-x64
3workspace/...es.txt
windows11-21h2-x64
3workspace/...t.json
windows11-21h2-x64
3workspace/...em.png
windows11-21h2-x64
3workspace/...n1.png
windows11-21h2-x64
3workspace/...on.png
windows11-21h2-x64
3workspace/...nd.png
windows11-21h2-x64
3workspace/...on.png
windows11-21h2-x64
3workspace/...st.png
windows11-21h2-x64
3workspace/...r1.png
windows11-21h2-x64
3workspace/...on.png
windows11-21h2-x64
3workspace/...on.png
windows11-21h2-x64
3xxhash.dll
windows11-21h2-x64
1zstd.dll
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/09/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
ZoraraVVVER2.8.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
ZoraraUI.deps.json
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
ZoraraUI.runtimeconfig.json
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
bin/Monaco/vs/editor/editor.main.css
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
settings.txt
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
workspace/.tests/appendfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
workspace/.tests/getcustomasset.txt
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
workspace/.tests/isfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
workspace/.tests/listfiles/test_1.txt
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
workspace/.tests/listfiles/test_2.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
workspace/.tests/loadfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
workspace/.tests/readfile.txt
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
workspace/.tests/writefile
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
workspace/.tests/writefile.txt
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
workspace/286090429.txt
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
workspace/vape/CustomModules/8560631822.lua
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
workspace/vape/CustomModules/cachechecked.txt
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
workspace/vape/Profiles/1430993116GUIPositions.vapeprofile.txt
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
workspace/vape/Profiles/4483381587.vapeprofile.txt
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
workspace/vape/Profiles/4483381587.vapeprofiles.txt
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
workspace/vape/Profiles/whitelist.json
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
workspace/vape/assets/AddItem.png
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
workspace/vape/assets/AddRemoveIcon1.png
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
workspace/vape/assets/BackIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
workspace/vape/assets/BindBackground.png
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
workspace/vape/assets/BlatantIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
workspace/vape/assets/CircleListBlacklist.png
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
workspace/vape/assets/ColorSlider1.png
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
workspace/vape/assets/CombatIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
workspace/vape/assets/DiscordIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
xxhash.dll
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
zstd.dll
Resource
win11-20240802-en
General
-
Target
workspace/vape/Profiles/4483381587.vapeprofile.txt
-
Size
15KB
-
MD5
4f51748e585715ecc8a937949bfd576b
-
SHA1
3a26c1a5686685af3502204546b398224d8abd89
-
SHA256
c70afccc05cb4ee25ec4733615984f1c50055d75d43786c627fb8e5c09e8427a
-
SHA512
a9c4f938ac1a60d06be1b577dc130085e1c2e238d231fd82d7976079cdfa4351ef443cab0386a92fe113ac307a00fb9df6a79d096c0a68cd6206a476bfa57a64
-
SSDEEP
384:SsnVZugPwwEhuldHAfZFykPQGult2QFLE7T1gLuHF1uouro9OPwj0TGyLAekUoqB:SsnVZugPwwEhuldHAfZFykPQGult2QFD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2612 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3348 wrote to memory of 2612 3348 cmd.exe 80 PID 3348 wrote to memory of 2612 3348 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\workspace\vape\Profiles\4483381587.vapeprofile.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\workspace\vape\Profiles\4483381587.vapeprofile.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2612
-