Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 00:57

General

  • Target

    f18b3c320f5a42fb861b69ff76e94874_JaffaCakes118.exe

  • Size

    237KB

  • MD5

    f18b3c320f5a42fb861b69ff76e94874

  • SHA1

    f6a18d4a4225445fe6d6c9290f15202a94b9387c

  • SHA256

    ce8f704782e78d1fc3eb9f7ee6f24bf45eb81881166be1b99cdb3bab540a89ea

  • SHA512

    5f6f9c062de7fce507aec041c609b02a1112efd7f87de68d2ff067e5d6f3b392559a4306152ba60604fefd0933090ae0f736cd767a994e5cfc6cda18306eac5b

  • SSDEEP

    6144:W+NuDTPypWlWNr0viNy8ZnR5oRMfpJaFNezr8:WcunapWYBZERM8KA

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f18b3c320f5a42fb861b69ff76e94874_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f18b3c320f5a42fb861b69ff76e94874_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BCFA.tmp

    Filesize

    1KB

    MD5

    8367f8e43f2569f226888b81ba161937

    SHA1

    29cc7e26edb47375fb1e91b99d450c0192bed77f

    SHA256

    e0c0d778217c79807d96c36c331be7645cf34023f13e6f2294e7248f0846aa12

    SHA512

    3d9c162c34f251cbb44f081c2d0f5654157edb3b3cd561bbd821f7ece998a99d15242cf199fbdc7d7a46025c5cac92d186ad563f4b89131fdd4b3a53d4d6790e

  • C:\Users\Admin\AppData\Local\Temp\BD97.tmp

    Filesize

    24KB

    MD5

    bf4d244a543063358e33e752201081fc

    SHA1

    e5f7450ba7ad90475e45fc42ccce6d9db8e8ef64

    SHA256

    9121d8627b17cd20384fe213b457d7e61908a126b27aac09768228a508b093a2

    SHA512

    c339b22de875411ea53cd262f903a69c05ce9f4e835d35bef166424d0ed4413363a8bd68b6a08ff8b42485665dd9519c0b214664a849186f9a6bb9a10ea73c6b

  • C:\Users\Admin\AppData\Local\Temp\C7F4.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\C882.tmp

    Filesize

    24KB

    MD5

    aa4e3e4b4dc1a0ddc955581a216e093b

    SHA1

    1685bfc738c62d1d7262b4365c86f2b5c5c76bcb

    SHA256

    19ca32b0e8acfacb55c1657532bc499bfae12945af7459262beb54f90c3fb747

    SHA512

    44dceaa3780ebaf9039d54ce2be19b40a951c57101b5226c761d937dd559d91a264f0bde337be68026c612c3bc34bd4e2678dcf9934f24c0b645428fd83db854

  • memory/2368-0-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2368-1-0x00000000002A0000-0x00000000002F8000-memory.dmp

    Filesize

    352KB

  • memory/2368-2-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2368-4-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-15-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2368-14-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-12-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-10-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-8-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-6-0x00000000028C0000-0x0000000002974000-memory.dmp

    Filesize

    720KB

  • memory/2368-16-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-21-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-20-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-18-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-53-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-54-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-55-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-56-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-57-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-58-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-59-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-60-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-61-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-62-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-63-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-64-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-65-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-67-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-98-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-97-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-96-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-95-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-94-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-93-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-92-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-91-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-90-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-89-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-88-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-87-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-86-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-85-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-84-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-83-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-82-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-81-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-80-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-79-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-78-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-77-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-76-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-75-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-74-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-73-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-72-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-71-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-70-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-69-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-68-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-66-0x0000000002A80000-0x0000000002B43000-memory.dmp

    Filesize

    780KB

  • memory/2368-346-0x00000000002A0000-0x00000000002F8000-memory.dmp

    Filesize

    352KB

  • memory/2368-347-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB