Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2025, 07:26

General

  • Target

    JaffaCakes118_7d5bdffd0a5ff19e78bf4ef0ddcfc584.exe

  • Size

    206KB

  • MD5

    7d5bdffd0a5ff19e78bf4ef0ddcfc584

  • SHA1

    07dea5f0e79381f55d8dc75066a5a42effd83982

  • SHA256

    7a171a212762eea12c61443f2746fe385b29e65b0b5d65a28d8e6e63e1b81cc7

  • SHA512

    74971072eb9e4cffc4222859e483bcf3cac84bfdcb733bde787a08f09349e0242dedf6b70472d8272bf5da3349cfe46dd9c7be55186f6f006f3230769f874260

  • SSDEEP

    3072:NZKoxQb+k9QvlM2UomDQEGPjRHfNtPYuD/V9P8rMz8csf2jacKUSI7Lj/PKbcVGX:/rox9QUkEq9/nP3D/jP8Pcu65GbNwy

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d5bdffd0a5ff19e78bf4ef0ddcfc584.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d5bdffd0a5ff19e78bf4ef0ddcfc584.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    206KB

    MD5

    8497fe0d7f1cc91f8f10d247d630195e

    SHA1

    d42f00db65b4645c9e417956b302addabeb5d46b

    SHA256

    a6505ae108208a7ceb38515599a6398ec68d692d0bdae777e97842a25757f6df

    SHA512

    d98d7b5749c92abedf15d48634cc51409cbe409373b81e575585c1adb5a038fa229cf508bff078ee0c47af11de895d5ffc92c1870ab4a2242b3b7e91ea85d246

  • memory/1144-0-0x0000000000740000-0x0000000000792000-memory.dmp

    Filesize

    328KB

  • memory/1144-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1144-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1144-15-0x0000000000740000-0x0000000000792000-memory.dmp

    Filesize

    328KB

  • memory/1144-14-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4496-13-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4496-17-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4496-19-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4496-18-0x0000000002A00000-0x0000000002AAA000-memory.dmp

    Filesize

    680KB

  • memory/4496-20-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-24-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-22-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-42-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-43-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-81-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-79-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-78-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-77-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-76-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-75-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-74-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-73-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-72-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-71-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-69-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-68-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-67-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-66-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-65-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-64-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-63-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-62-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-59-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-58-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-57-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-56-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-55-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-53-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-52-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-50-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-48-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-47-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-46-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-45-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-44-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-41-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-39-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-38-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-37-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-35-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-34-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-33-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-32-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-31-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-30-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-29-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-28-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-27-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-80-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-70-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-61-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-60-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-54-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-51-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-49-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-40-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-36-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-26-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4496-25-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB