Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2025, 07:16

General

  • Target

    JaffaCakes118_786202e85971fe480f5134f2e7f05478.exe

  • Size

    210KB

  • MD5

    786202e85971fe480f5134f2e7f05478

  • SHA1

    468380670cd00afe4053aba20adea53954df5004

  • SHA256

    0b225f1302d65e3f342bdf13a2bcba5ca82873d03a90355b4e048c623d298bd0

  • SHA512

    a6fc4b43ca1d211692d0db4260b858951c09fd3920bcb3312ac1e66011f727b305662f1a569e86b76b1b57ac2b47e1313fcf068cc3b03cc9a20016259d2ee725

  • SSDEEP

    6144:T7xbm2ovXZr6nwnkrJjA1uWuS05Nw3rlkq9xPgLO:T7xkQrJ2oEOWqC

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_786202e85971fe480f5134f2e7f05478.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_786202e85971fe480f5134f2e7f05478.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XG2PTJB4\login[2].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • \Windows\AppPatch\svchost.exe

    Filesize

    210KB

    MD5

    3ff2121928e6df88b2b6e622a5f9a7c2

    SHA1

    58e538f6ce0db55e1e990b779ae59959ac095f80

    SHA256

    3ca205ba5e0b10a1157feefa6a274e5c2a824952dc54a2c769349e33fa878211

    SHA512

    fbdd7af53d64d567444adad2df527badcd911d6248a62fa32219f2bddbab01e6d8ba7581e3441ce2132eefa9c6070ceee50da74540f61e4868ae643d31a36d28

  • memory/2092-74-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-71-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-36-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-22-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2092-42-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-43-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-44-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-35-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2092-34-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-32-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-30-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-28-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-26-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-25-0x00000000023D0000-0x000000000247A000-memory.dmp

    Filesize

    680KB

  • memory/2092-38-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-40-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-49-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-64-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-86-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-85-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-84-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-83-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-82-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-81-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-80-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-79-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-78-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-77-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-76-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-75-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-23-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2092-20-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2092-63-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-73-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-70-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-69-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-68-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-67-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-66-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-65-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-72-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-62-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-61-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-60-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-59-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-57-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-56-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-55-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-54-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-53-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-52-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-51-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-50-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-48-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-47-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-58-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-46-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2092-45-0x0000000002580000-0x0000000002637000-memory.dmp

    Filesize

    732KB

  • memory/2900-21-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2900-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2900-1-0x00000000004A0000-0x00000000004F2000-memory.dmp

    Filesize

    328KB

  • memory/2900-0-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2900-19-0x00000000004A0000-0x00000000004F2000-memory.dmp

    Filesize

    328KB

  • memory/2900-18-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB