Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 16:13

General

  • Target

    JaffaCakes118_74e1172d52b664d83ba476a80b3a0700.exe

  • Size

    206KB

  • MD5

    74e1172d52b664d83ba476a80b3a0700

  • SHA1

    5d646ad9446b71eeff51f96b5b0511b3f851eae2

  • SHA256

    8a331ddd4c685fee40bc983711d59212e38d4655e53469262baa0dac05b542d2

  • SHA512

    397dd4bb3aec1f7b03c2204969f016bef38e1fefdfe30b3112692bc9746f7ace6bb278d2fce877d4954480057fc74247b69b51445812ce18eb0bbeb62940dc0b

  • SSDEEP

    3072:zZKoxQb+k9QvlM2UomDQEGPjRHfNtPYuD/V9P8rMz8csf2jacKUSI7Lj/PKbcVGX:Frox9QUkEq9/nP3D/jP8Pcu65GbNwy

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e1172d52b664d83ba476a80b3a0700.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e1172d52b664d83ba476a80b3a0700.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    206KB

    MD5

    dfb44a46a12a0f9ff16f5d8c7e663677

    SHA1

    07408a380c1eb5bb1d9f0eea8d76b301029fda55

    SHA256

    cd9ea007fe5cf1b3da1bf8deb940c9715cdb829bcd61f5cbbcafbf1498660b64

    SHA512

    0d456cde42a5a3ca45e47ece14ebf65de34dc3c5ac022b9158b3ad9581a8ffadbe428d7fc980f747b6fceff64e7b40052a63626b81bead74387f4707f023c735

  • memory/1212-55-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-53-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-18-0x0000000002A00000-0x0000000002AAA000-memory.dmp

    Filesize

    680KB

  • memory/1212-19-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1212-25-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-27-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-20-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-22-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-24-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-28-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-35-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-81-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-80-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-79-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-78-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-77-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-76-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-75-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-74-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-73-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-71-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-70-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-69-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-68-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-67-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-65-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-64-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-63-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-62-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-61-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-60-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-58-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-57-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-52-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-17-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1212-54-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-16-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1212-51-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-50-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-49-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-48-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-47-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-46-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-44-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-43-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-42-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-41-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-40-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-39-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-38-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-36-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-34-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-33-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-32-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-31-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-30-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-29-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-26-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-72-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-66-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-59-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-56-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-45-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/1212-37-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3700-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3700-0-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/3700-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3700-14-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/3700-13-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB