Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 09:03

General

  • Target

    fbf45a688c5b2cb9604fe23d7f4a1381_JaffaCakes118.exe

  • Size

    576KB

  • MD5

    fbf45a688c5b2cb9604fe23d7f4a1381

  • SHA1

    6b323d0fb379ec774dc5bbed0f76babc79496117

  • SHA256

    f63ef7c5fe892d420701cf9ed20647ecc4ef239ec765f92686de33cb5974e8aa

  • SHA512

    d61f18ce559c85c7b90750172b6368368617c983cc6f70d9a9ba30c8ea87f5cff753a155bf8c6830bbd7f12ca7ed8e14f5fea4c470fbc5fa7ce7def468030e00

  • SSDEEP

    12288:UmWhND9yJz+b1FcMLmp2ATTSsdxmWhND9yJz+b1FcMLmpG:UmUNJyJqb1FcMap2ATT5rmUNJyJqb1Fl

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbf45a688c5b2cb9604fe23d7f4a1381_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbf45a688c5b2cb9604fe23d7f4a1381_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C0C3.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\FD9A.tmp

    Filesize

    42KB

    MD5

    a584c1dd5b1872742bc120d75fd1a23f

    SHA1

    382cebe53d1c26381263f3bcbf83b61ef7e4cd63

    SHA256

    5f8a50923e283cec9e3bcb288bc85bab92a534dc7c3026d5b40bf7a885654955

    SHA512

    ed7f78ebe0130461b89997672345253f8368f90ad24bcc6333c70d3573d748c3fc8f543812a80ced4cf4565970639cbd8005ee284f1d7d24858f106bc9b773d2

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    576KB

    MD5

    0aad823b7d2f195d9a063c6d4f719f22

    SHA1

    fdd75528b2e27e7dca0becd0204dfec4a57f7bc0

    SHA256

    d20770f0f3bf11fda6dfe40915338b25c86700cfe7799f267570e6a4c0909a76

    SHA512

    b6723a68d87e02efa46236db4f114fd25df9515785418f6c512b2540391d6ff632a23361d63ed21a5d54182e4a13715d1b74d61ed264693b35a9d17c8305cbcc

  • memory/2644-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2800-14-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-20-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-24-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-18-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-16-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-23-0x0000000000310000-0x00000000003B8000-memory.dmp

    Filesize

    672KB

  • memory/2800-25-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-27-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-29-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-33-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-38-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-57-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-77-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-76-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-75-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-74-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-72-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-71-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-70-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-69-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-68-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-67-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-66-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-65-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-64-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-63-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-62-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-61-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-60-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-59-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-56-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-55-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-54-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-53-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-52-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-51-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-50-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-49-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-48-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-47-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-46-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-73-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-45-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-44-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-43-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-42-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-41-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-58-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-39-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-37-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-36-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-35-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-34-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-31-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-40-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-32-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB

  • memory/2800-191-0x00000000023C0000-0x0000000002476000-memory.dmp

    Filesize

    728KB