Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 09:54

General

  • Target

    eb15b850108de0cf3579a68b87802df3_JaffaCakes118.exe

  • Size

    267KB

  • MD5

    eb15b850108de0cf3579a68b87802df3

  • SHA1

    f0fd53791a456c0d95cc6ad3de76f5c4703d97e9

  • SHA256

    c18615153288383eab791393a4a9895aee8c06f234e31b10f2626881d504275a

  • SHA512

    1469c82303e969d3e4797ad6ed50ae3241efb108571494aff4d892390525b1c4e110ae6690cf4b62c17b699417e08df2d8b9657cf075a7b6fea9d03177b3a7d6

  • SSDEEP

    6144:LllslxMfjmxPA2XK/l78oJ5sXXZnW4j9NY:ElEqxPlX078oJOZnd9NY

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb15b850108de0cf3579a68b87802df3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb15b850108de0cf3579a68b87802df3_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1916-0-0x0000000000400000-0x0000000000510000-memory.dmp

          Filesize

          1.1MB

        • memory/1916-1-0x00000000002A0000-0x00000000002EF000-memory.dmp

          Filesize

          316KB

        • memory/1916-2-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1916-12-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-14-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-15-0x0000000000400000-0x0000000000510000-memory.dmp

          Filesize

          1.1MB

        • memory/1916-8-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-6-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-4-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-10-0x0000000002A00000-0x0000000002AB2000-memory.dmp

          Filesize

          712KB

        • memory/1916-16-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-22-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1916-20-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-19-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-42-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-43-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-44-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-45-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-47-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-46-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-63-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-48-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-49-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-67-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-66-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-65-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-64-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-62-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-61-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-60-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-59-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-58-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-57-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-56-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-55-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-54-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-53-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-52-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-51-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-50-0x0000000002C30000-0x0000000002CE8000-memory.dmp

          Filesize

          736KB

        • memory/1916-169-0x00000000002A0000-0x00000000002EF000-memory.dmp

          Filesize

          316KB

        • memory/1916-170-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB