Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 18:20

General

  • Target

    JaffaCakes118_7530c3a92be331d5cd8d3daba94e3521.exe

  • Size

    206KB

  • MD5

    7530c3a92be331d5cd8d3daba94e3521

  • SHA1

    2d95970df08bfe6429e84b8dae9055c7e5041db8

  • SHA256

    ad8b956286161bd21c88fe59a5574f3cbe78999b87eeade9d95ae338c4d4a0e8

  • SHA512

    461189b93c61f78a4710a3965baf300ba6a08398fb3f87da6923e78bfbaf8e4d28745e2d139ed08665a807cdef62c013e26a40b0767b595066ca5d74493f9df9

  • SSDEEP

    3072:NZKoxQb+k9QvlM2UomDQEGPjRHfNtPYuD/V9P8rMz8csf2jacKUSI7Lj/PKbcVGX:/rox9QUkEq9/nP3D/jP8Pcu65GbNwy

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7530c3a92be331d5cd8d3daba94e3521.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7530c3a92be331d5cd8d3daba94e3521.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    206KB

    MD5

    e62fd3a23f8793cf34fd61d705fffb84

    SHA1

    5b1c23e700a6a343d3cfae901b29333d14c3f55a

    SHA256

    d9f4166528d4ec81ff6670a4b490f87d44fd153f16db939b2f5cf9559700b7cd

    SHA512

    91aca02673b30a476d2fc3174d25bb94902171107235c7d425d82599faaac87f890242cc976ad073f2f701bb473c8348d2b36a829d22d5d2b6787efcfd01bf3f

  • memory/720-0-0x00000000021E0000-0x0000000002232000-memory.dmp

    Filesize

    328KB

  • memory/720-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/720-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/720-14-0x00000000021E0000-0x0000000002232000-memory.dmp

    Filesize

    328KB

  • memory/720-12-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4128-16-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4128-17-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4128-18-0x0000000002A00000-0x0000000002AAA000-memory.dmp

    Filesize

    680KB

  • memory/4128-19-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4128-20-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-24-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-22-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-34-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-31-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-81-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-80-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-79-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-78-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-77-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-76-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-75-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-73-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-72-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-71-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-70-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-69-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-68-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-67-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-66-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-65-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-64-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-63-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-62-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-61-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-60-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-59-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-58-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-56-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-55-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-54-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-53-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-52-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-51-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-50-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-49-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-48-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-47-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-46-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-45-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-44-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-43-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-42-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-41-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-39-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-38-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-37-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-36-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-35-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-33-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-32-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-30-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-29-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-28-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-27-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-26-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-74-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-57-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-40-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4128-25-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB