Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 05:03

General

  • Target

    fb8ef427ea5f493a9dc8d4736c714d87_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    fb8ef427ea5f493a9dc8d4736c714d87

  • SHA1

    0745df419cb0147fa1ce51e604c27b6bbfb81536

  • SHA256

    4b249b083b77f9565539d5e327d4883f8f7fa4484fdd9460a73262bf1c76d681

  • SHA512

    12e8ae890eea893ac6cf7443ae53b6d6c8fd53ed0d7bb00cba4a6c155313693f7a1be49c449a42d516f4516cb1e58a0550af9e4f4e370c569f55fb18aa81debb

  • SSDEEP

    24576:wmUNJyJqb1FcMap2ATT5rmUNJyJqb1FcMap6mUNJyJqb1FcMap2ATT5rmUNJyJqG:wmV2AprmV6mV2AprmV6mV2AprmVG

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb8ef427ea5f493a9dc8d4736c714d87_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb8ef427ea5f493a9dc8d4736c714d87_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\45DD.tmp

    Filesize

    1KB

    MD5

    690b55e24a8de21122f1fbd4b5ba0e12

    SHA1

    c49b18df97d314c5efb92069b520ea19b5849934

    SHA256

    759c72ab9324e9b5c9194eef6b40a6492800230370f643fa27873337db286581

    SHA512

    6283ee8950a42deb1235580f94999654fd450a359cb9b1e4a0d2f052d84a63718f8af86f91b1193c3a8c9bb11e671439d290ba1b759324d1f62e89d267e6bc6b

  • C:\Users\Admin\AppData\Local\Temp\A08E.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\E822.tmp

    Filesize

    42KB

    MD5

    cea28e338d0f2336950df342eafb3171

    SHA1

    45939dc5433f68035c5f71a2a8890c65b83ed434

    SHA256

    fca8fbafcdef01ba4b08c71ac5794a03c19fda5b08714121530a13257cd42d81

    SHA512

    7bc6bb0d7bf47cce611a4e7a2ccc580962a48bb94368cd8a1c5e860d5322d8610beefcbd649d09cbab43638c3dd5dc6f6e8b917d6fc6760a582dae768793b0c8

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    1.7MB

    MD5

    bfdd808a6fce8ac16647d4dace81061a

    SHA1

    b1364aeef75c85f1d41da69d6efd4296b0b8cb7b

    SHA256

    28582d2b09b3f73ae7d30630ddb11b5e828d5d883937e38a2e99d6d9e0a6136d

    SHA512

    8f358320fd8806454dbfa69859b115b97b0c7ccbff1d45798d6259f32e034bfc4096769a9e476a9095c6f6ea710604f02df4cb04fe935dddab296ab3fc21a224

  • memory/1824-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2452-14-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-16-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-18-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-20-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-24-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-22-0x0000000000460000-0x0000000000508000-memory.dmp

    Filesize

    672KB

  • memory/2452-28-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-27-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-30-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-56-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-61-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-78-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-77-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-76-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-75-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-74-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-73-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-72-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-71-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-70-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-69-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-68-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-67-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-66-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-65-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-64-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-63-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-62-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-60-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-59-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-58-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-57-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-55-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-54-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-53-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-52-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-51-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-50-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-49-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-48-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-47-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-46-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-45-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-44-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-43-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-41-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-40-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-39-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-38-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-37-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-36-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-35-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-34-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-33-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-42-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-32-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB

  • memory/2452-192-0x0000000002290000-0x0000000002346000-memory.dmp

    Filesize

    728KB