Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 20:36

General

  • Target

    ad83551a5b68116ef1c6712fe35fb4ef_JaffaCakes118.exe

  • Size

    243KB

  • MD5

    ad83551a5b68116ef1c6712fe35fb4ef

  • SHA1

    c99a61af9a69b32bed9ce8ffebdd6b307dffc9f7

  • SHA256

    b57484c565f9b7f224ad792b351b9f762c2898b2d9382a0c24c5b30a5dc1fb4d

  • SHA512

    5be6f80464469ff4728fb307644454600ca6000cab5da3b4907783ee60ecfa9906e9b7fb182826ef24edb6a3fd63eccc503fbea2a36c7b6ea53cd8097cb3cc81

  • SSDEEP

    3072:+ulm1rNSRUioV+Jjb+IcCJjvS02lLjzRSU9JLAK3W+wGglJLCRCvOX9QOr:Nm8RUDcJ+IcC1H2NzRBLfwGga9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad83551a5b68116ef1c6712fe35fb4ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad83551a5b68116ef1c6712fe35fb4ef_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\852.tmp

    Filesize

    1KB

    MD5

    36e01183613c3e8a35990e1cd0aaa083

    SHA1

    d7e97bbeb41031054f40e90fd1ed3dbee2516f4b

    SHA256

    44997116b5baf2b0f6b6f5c0bd61e581537c8b458d45e2985a4233c20a1067c7

    SHA512

    78ba79b07bd806d4418cc656ecf85f1eeb7cfc30ef6e11aeed7c7a901765c8232cda00b2db8e97ef0d03641930386f3d9c86a2920e724054a23fb4646459fbe8

  • C:\Users\Admin\AppData\Local\Temp\B70A.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\BA1B.tmp

    Filesize

    1KB

    MD5

    218703d3347f0ae72e3fafb93cfd11d0

    SHA1

    3043e63a9d5a78e0ff34b360604d874b99db8f2f

    SHA256

    4f50e80ec09ccd044fe2bb45c85b2f2e80b6cab49d44c89a908313db8d8148fa

    SHA512

    503a378e854e576d7d85d482b212036de13db3a9f8dc9900ab1d9106d81c3790783ce2fcaf5005f2b4a7bc34107c003213eeac1a679f406ae2b7d95271b8cba7

  • C:\Users\Admin\AppData\Local\Temp\BB7D.tmp

    Filesize

    1KB

    MD5

    a574c698ddf476771054c445d52f1d63

    SHA1

    b8896ccd4eef4c22fd61f24a6e6b50dd51011eed

    SHA256

    790586a68315836d8cfd0f0a6fecdec8c79f6ee5a5059c010393b6f2d76dfff3

    SHA512

    62080e50fbd0b46d8037aefbe9c65b761a6b40bf2b1d8a0d497a9215d2cd892ccf7eb8896cb5b0c6abbae11405957d5b73fb899b0b5d622c656495fd3cd0d470

  • memory/2776-54-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-212-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2776-12-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-10-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-8-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-6-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-4-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-97-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-21-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-18-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-20-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-57-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-1-0x0000000000220000-0x0000000000278000-memory.dmp

    Filesize

    352KB

  • memory/2776-55-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-56-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-58-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-59-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-60-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-61-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-66-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-65-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-64-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-63-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-62-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-68-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-67-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-69-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-70-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-15-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2776-3-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/2776-95-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-14-0x0000000001FB0000-0x0000000002064000-memory.dmp

    Filesize

    720KB

  • memory/2776-16-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-94-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-93-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-92-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-91-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-90-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-89-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-88-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-87-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-86-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-85-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-84-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-83-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-82-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-81-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-80-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-79-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-78-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-77-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-76-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-75-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-74-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-73-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-72-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-71-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-209-0x0000000000220000-0x0000000000278000-memory.dmp

    Filesize

    352KB

  • memory/2776-96-0x0000000002480000-0x0000000002543000-memory.dmp

    Filesize

    780KB

  • memory/2776-2-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2776-0-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB