Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 17:30

General

  • Target

    144a302f40edce073205ca1920aa1162_JaffaCakes118.exe

  • Size

    241KB

  • MD5

    144a302f40edce073205ca1920aa1162

  • SHA1

    67e272561741285d42899a358e1717701bcb5eb7

  • SHA256

    f502d8ee6d9bd320926a18c5895061478a99b34456dc447890118970024373bc

  • SHA512

    9e3bbb9f7a9e9dcefe95d42affa7f6ac05c4f7aa3e0c5d7bf24160c6dc337071dccc69df8a7c4c69d0472371775ed86f25549a31fd96e9e96c2c3037e912c518

  • SSDEEP

    6144:tsY7cf92DU4H9nBn4hbbuVyUWYgH4Va5X3g4sVs:tSFufH1BnOPuPM4OX3gts

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • simda

    Simda is an infostealer written in C++.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\144a302f40edce073205ca1920aa1162_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\144a302f40edce073205ca1920aa1162_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\B5BE.tmp

          Filesize

          1KB

          MD5

          fc8db0030e96ad7e069d9dcc6c389f8e

          SHA1

          15343b3b65d383487926f8cc38ae45ad1b582345

          SHA256

          20344358a357d5e994f5c3adfcc485556886ea73415ecbdf9be5149bc3887a89

          SHA512

          787454a624ff4ecac455bcf90bb9ad39529a865d190774f5ffe95e7cf1f218e6b90c3e9161259fc9c199b37403df0ed862597f7226c71cd4e3dd9b5e81cbbb41

        • memory/4152-0-0x0000000000400000-0x00000000005F4000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-1-0x00000000023C0000-0x0000000002418000-memory.dmp

          Filesize

          352KB

        • memory/4152-2-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB

        • memory/4152-3-0x00000000007C0000-0x00000000007C1000-memory.dmp

          Filesize

          4KB

        • memory/4152-4-0x0000000002770000-0x0000000002824000-memory.dmp

          Filesize

          720KB

        • memory/4152-5-0x0000000000400000-0x00000000005F4000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-6-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-8-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-10-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-11-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-126-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-135-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-154-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-153-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-152-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-151-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-150-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-149-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-148-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-147-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-146-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-145-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-144-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-142-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-141-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-140-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-139-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-138-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-137-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-136-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-134-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-133-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-132-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-131-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-130-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-129-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-128-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-127-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-125-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-124-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-123-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-122-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-121-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-120-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-119-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-113-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-118-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-117-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-116-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-115-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-114-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-112-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-110-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-109-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-107-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-106-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-105-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-104-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-103-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-102-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-143-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-111-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-108-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-101-0x0000000002970000-0x0000000002A33000-memory.dmp

          Filesize

          780KB

        • memory/4152-239-0x00000000023C0000-0x0000000002418000-memory.dmp

          Filesize

          352KB

        • memory/4152-247-0x0000000000400000-0x0000000000464000-memory.dmp

          Filesize

          400KB