Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2024, 06:55

General

  • Target

    7e4214b6b536d51a67377c44264dcb92_JaffaCakes118.exe

  • Size

    203KB

  • MD5

    7e4214b6b536d51a67377c44264dcb92

  • SHA1

    4e9c429630fdf07eba358fb2d0f6322cf6d8ae38

  • SHA256

    c58a40ceb0541b8ad81fc0dd995049e2acc626be0a23854dd87de0b395d651d0

  • SHA512

    7a8be074ba0714df185418a97037891e148574a49257b19d9e390b9fea598a2ef8627349db064ebdac7fb1d6a01cb3794d91562d1aa3e8c25026df3fefae6d90

  • SSDEEP

    3072:gbE5YlQXawrYZcDUUgAsJ25A2CPp/UYzBidANJNd24YBDxLOohssXoenet:gfmkqDUTaA9R5BidAfN5YJ8ohsEob

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e4214b6b536d51a67377c44264dcb92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7e4214b6b536d51a67377c44264dcb92_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    dcbb7cac830a66063d26ba18bdd6f3c0

    SHA1

    051913e499b9757f55f0381831041efdaba06688

    SHA256

    0bae71e2cab827c73c3e2b22bbfc3c9b2849ecb0722889edbb503c4c609e528a

    SHA512

    8ddd4ae69bf9b5b63996787a68c4ecc484e1bb813468d8a1dba2ca451f2e8e4afed35ae8d9004c11bf321fa1b34d66602c0b9d6b9997d8468276365385b59fdb

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    31d30b5e1682bd082f5629d7787f95bc

    SHA1

    f8ab5767925e2ad5697cd6dc340beaef1ba57979

    SHA256

    3af51f99fe8a71c04d0bdf332b59490ac23a3c308c56457f42b3b6bc07535930

    SHA512

    5e8f087b99e97f3087827cbb1f356317e64743ae54fbae01750f302dbef5e78ad9ad8f419ba6df22c7579cf4cbef3a70d222d5ab903827365b92d052173aacc3

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\login[3].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • \Windows\AppPatch\svchost.exe

    Filesize

    203KB

    MD5

    c54921c977c759e4a82c4492eb247cbf

    SHA1

    31d778f9a7b2d03ca9970aca6bbba800430044ee

    SHA256

    776b04e812d98b4ca19de1fd77ac91ac1ea091c0741dcb04283d37889b8f1bea

    SHA512

    a7d6dada9e39ad5badfd538f70024a302bab63c6fc914ce998127206712b8b74945544d674dec4b0e3fb157973ad65dd018099c4d47d8ecf641e59f5c52df272

  • memory/524-1-0x00000000003B0000-0x00000000003FF000-memory.dmp

    Filesize

    316KB

  • memory/524-0-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/524-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/524-18-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/524-17-0x00000000003B0000-0x00000000003FF000-memory.dmp

    Filesize

    316KB

  • memory/524-16-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/1708-76-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-68-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-30-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-32-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-28-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-33-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/1708-26-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-24-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-22-0x00000000006F0000-0x0000000000794000-memory.dmp

    Filesize

    656KB

  • memory/1708-36-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-38-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-34-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-47-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-49-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-84-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-83-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-82-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-81-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-80-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-79-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-78-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-77-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-20-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/1708-75-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-74-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-73-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-72-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-71-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-69-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-21-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/1708-67-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-66-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-65-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-64-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-63-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-62-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-61-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-60-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-59-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-57-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-56-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-55-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-54-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-53-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-52-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-51-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-50-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-48-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-46-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-45-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-44-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-43-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-42-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-19-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/1708-70-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-40-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-58-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB

  • memory/1708-41-0x00000000025E0000-0x0000000002692000-memory.dmp

    Filesize

    712KB