Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 17:43

General

  • Target

    JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d.exe

  • Size

    240KB

  • MD5

    6e59b7f6c90dd0f33c0a94525ad4a74d

  • SHA1

    c12973597c075822ffa5accf290f02441fd422cd

  • SHA256

    a45e5df6cfa9d6cc373dda8cc2a7bb8fc61e5efc101ff0a8974a0c76abf3f709

  • SHA512

    91ad1f3565222295896f94918bcfc7c980db65bd19c110e6e73c12447ff7d6c8b181b04145f91931e9206b3384464d28b121de0777b0fce346ac7a2aea0f519c

  • SSDEEP

    6144:PCjwi1P9gVmZK7YE5CkZ6p5fGfyzvacs6IaVgAyWYd:pi1PJO1CkZ6p5u6Tw6/VoWYd

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e59b7f6c90dd0f33c0a94525ad4a74d.exe"
    1⤵
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2736-0-0x0000000001F90000-0x0000000001FE8000-memory.dmp

    Filesize

    352KB

  • memory/2736-1-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2736-13-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-11-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-9-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-8-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-5-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-3-0x00000000026E0000-0x0000000002794000-memory.dmp

    Filesize

    720KB

  • memory/2736-14-0x0000000000400000-0x00000000005B1000-memory.dmp

    Filesize

    1.7MB

  • memory/2736-15-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-20-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-19-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-17-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-62-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-54-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-53-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-66-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-56-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-57-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-55-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-81-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-59-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-58-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-98-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-97-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-96-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-95-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-94-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-93-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-92-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-91-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-90-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-89-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-88-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-87-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-86-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-85-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-84-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-83-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-82-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-80-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-79-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-78-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-77-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-76-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-75-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-74-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-73-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-72-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-71-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-70-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-69-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-68-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-67-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-65-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-64-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-63-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-61-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-60-0x00000000028A0000-0x0000000002963000-memory.dmp

    Filesize

    780KB

  • memory/2736-195-0x0000000001F90000-0x0000000001FE8000-memory.dmp

    Filesize

    352KB

  • memory/2736-197-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB