Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 00:18

General

  • Target

    bada314291a0806130d3b68df4bc98ed_JaffaCakes118.exe

  • Size

    355KB

  • MD5

    bada314291a0806130d3b68df4bc98ed

  • SHA1

    a740156418a6c2e7a1469c38cf57d70f585b6661

  • SHA256

    746caaec340337270168cbc2c4cc84b9fd14a7f20be0d4657004cd935df867eb

  • SHA512

    8f769e1a7cba3934377d97b8b24ab036de80bd719b3740dc081990b246c386915e783cdd714b61a585d8ff3740deb6997757ebfa5160ab8b1f4caf72f377488a

  • SSDEEP

    6144:d3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:ymWhND9yJz+b1FcMLmp2ATTSsdS

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bada314291a0806130d3b68df4bc98ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bada314291a0806130d3b68df4bc98ed_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GRYMSCZU\YK0B5N24.htm

    Filesize

    1KB

    MD5

    89b2e71ccc2c097170da96b8c2ac3691

    SHA1

    89211f7db056d4d394911b27b1441b480bf6fb84

    SHA256

    ca5533a6c7fdf84f9fd60a1f3552cbbd8c5a89b2629d730e6a723cc6033d93ca

    SHA512

    857616395328aa58294bd8ba9690da56f4c28f63c332f9fa8c9a07422eb5d61daf9254b01fd1bbcbd586da479ff17ec5253fb4868eddddc21b549d092faa2e20

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GRYMSCZU\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\6E22.tmp

    Filesize

    1KB

    MD5

    138e938ecc10ff8fa0f924f6e06cc619

    SHA1

    a1ce8baf6ecdc2fcaf0f9a8b63ffce9c0f472e19

    SHA256

    5e62630de7d7a721bf6b2244458cbd1bf74e3665a7f063433d51e85f6c9b3125

    SHA512

    960579a3d6ee2d43ef70816c45cdba9d1734819b5fc21949f2edfc9d0bc3515c58b78de7366f479871ce6fac43d58a8f7ebb30fa69959aa494a4c1c0c7dc2ec7

  • C:\Users\Admin\AppData\Local\Temp\8CD0.tmp

    Filesize

    1KB

    MD5

    c1cff2b0484aa78b9d74563f02d35ab9

    SHA1

    b0c8ae7bf2bdb8a095107f594a8925e4bf30fbd8

    SHA256

    a63569e8cae4be49fc914505f6d40fe1ccac1d0c9f7b41660e130e7b980694a3

    SHA512

    5a05dab1131d973dccb7f54f9fe1392a646f8bdb6904dcc62322f1cb2147d3523a08aa99922a299eecf0883a05d8f6f56b70617fc4e010d0b97719d600da2506

  • C:\Users\Admin\AppData\Local\Temp\9BC5.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\9BC5.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\AAA1.tmp

    Filesize

    61KB

    MD5

    38f92ff75c070fee1ae9613823d2a2fc

    SHA1

    6b949c24a7ef69f580d885c92903f00d1211a9d6

    SHA256

    10e76eb6877376b00cc1c3526afd9caafd93f7acf18ea00ccce95db10f52417e

    SHA512

    73f5c04a037ca5bac71c04a41e5868d504e93654e4eccad87e5c2d0b53c551250c7acc7c6472bbaf314110f0765d789357ad632a969b5679d21d7e168127622a

  • C:\Users\Admin\AppData\Local\Temp\AB15.tmp

    Filesize

    42KB

    MD5

    a26712925391b3fd7d2255cbae7ece98

    SHA1

    39d7fe83ded81a49e7d411b00fdcb4c428b3702e

    SHA256

    711d6ba729a5334f607a0b7b12fb61ad4bd2657d6415e9cefebb882f51da9791

    SHA512

    b736927d544fa515a15ac332eb8b17b7fe9f9722dbab6c080e3233234ef456dcb6623d194d743abbdc39aafdbfab2c0c664e802e01c17f15a6eaaebe32fbc81c

  • C:\Users\Admin\AppData\Local\Temp\CC8C.tmp

    Filesize

    61KB

    MD5

    e349547770d00897352c8a03a8da769c

    SHA1

    a6172d275a4d568a8f7701a6fa303747cff6ff9b

    SHA256

    e7c7d124fd663355c746810f274b9a33ea48c995057847fb968443c184263dae

    SHA512

    fb9d2bbfce0f6b9fee45c379613d762ea93ab1721b024cba36163397313f11f7587d3e6891a746dddf37bff4b995ca8277f839265569750e28467fa2dd7b98b1

  • C:\Windows\apppatch\svchost.exe

    Filesize

    355KB

    MD5

    97827f22a516bd8e9c511e82f833a3e7

    SHA1

    082864b307cb30f0a9674f99939b98f8c7329763

    SHA256

    db7b22647d41e4d012cfa296412674451815d65797ae53ea69c79da976f4407a

    SHA512

    1ee25521abdc5ae6ff1106b7d3a8248989e445ed32b9695218a2efad25caf044f42fbae0c38129b9822d91a7cc240d7c7ca2d314256333d2e110e52ecb3226f4

  • memory/2532-8-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3268-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-11-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-10-0x0000000002720000-0x00000000027C8000-memory.dmp

    Filesize

    672KB

  • memory/3268-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3268-313-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB