Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 10:55

General

  • Target

    eb2ffbe6faa9889a7e6bf8e31b1835aa_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    eb2ffbe6faa9889a7e6bf8e31b1835aa

  • SHA1

    11ac24fd111f67df2f40a13cef24a1b9f4ee624d

  • SHA256

    a8389eaa6dedbe5086382fec126581a6da38fd49d05da74fba18846fd826d61d

  • SHA512

    45b658dc469d23249ea856e67b936a411cdcbb62d533c9dab48fc0394d1cf9066f297b0961bddf05a8e85d230c8121066d9d9eb3393368e0c1824ab585bea0ff

  • SSDEEP

    24576:/mUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT58:/mV2ApemV2ApemV2Ap8

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb2ffbe6faa9889a7e6bf8e31b1835aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb2ffbe6faa9889a7e6bf8e31b1835aa_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\AE9A.tmp

          Filesize

          593B

          MD5

          926512864979bc27cf187f1de3f57aff

          SHA1

          acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

          SHA256

          b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

          SHA512

          f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

        • C:\Users\Admin\AppData\Local\Temp\BAEA.tmp

          Filesize

          24KB

          MD5

          3142ba81204411c05fd36611f9df1404

          SHA1

          aa36c11356219f2ae63c87815891128c64de758e

          SHA256

          037a8d23da10ab17e3b80a23f156e90c1a1d01a428262b2c409d9061d1017537

          SHA512

          e903e6514c8a4a715e7c43683dc3d9b892448fe34fcdfb3a0e3ba519901180ec6a95ed5b09101d0837ec203eb4d516a311fbb32f309984862ed62b5b54262ad4

        • C:\Users\Admin\AppData\Local\Temp\BC57.tmp

          Filesize

          1KB

          MD5

          cd4611cb164dc6fe4b28804f3205e505

          SHA1

          2e214ebf479474cbf082c46f7697cb093e64988d

          SHA256

          72b5b049868c636653fc1a7f5379d077f92034f48774f22d1d7b9832d00e613d

          SHA512

          28d3e704325dbf7dc972b44763918ba53bc5e7bbda918206bbb56c6c8d765ae8d3a25c75f5033c1524140a13542b9b3cc993b5408fe5b521a0d105375afa622c

        • C:\Windows\apppatch\svchost.exe

          Filesize

          1.0MB

          MD5

          5374ef3902e68a0b4bf21569b049b1d5

          SHA1

          4edd81bbc33659c4f8a7f7cb9b90a4b6d1540d03

          SHA256

          b15a87aaa33a9bebaccf388202386dd0a33d7729bc1f8c01d65548f8f939e619

          SHA512

          1b57fb33d22023283a9deeee0640491a3ad359fa909084e43c987e99e31e79067580d9c682a65989e920d6db931e3827fc186b5e1cd2da139e7da72ca872cc13

        • memory/2072-9-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4032-10-0x0000000002720000-0x00000000027C8000-memory.dmp

          Filesize

          672KB

        • memory/4032-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-14-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-73-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/4032-161-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB