Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 23:18

General

  • Target

    JaffaCakes118_11daeba50c8cfb8994c2ceedec18f733.exe

  • Size

    212KB

  • MD5

    11daeba50c8cfb8994c2ceedec18f733

  • SHA1

    7c49f1dc34a0c04f9a7957c2077d767e19476251

  • SHA256

    59a73646e30a65dce766d0afa6d0c2723a11bc1ef47fe8aca5a6dda3eb0cd7fc

  • SHA512

    fe36d4ebaffcd7f1578464c8ae018c1125defbe32a35d556579a5be426f71cd8aa687503086d76d3a1b94d1fb4bc926565aa18e68c0d8bc719e73abb47a00c16

  • SSDEEP

    6144:Iob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4G:XboEj/8ASWM4Ki96/zqIKG

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_11daeba50c8cfb8994c2ceedec18f733.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_11daeba50c8cfb8994c2ceedec18f733.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8R55UT9S\login[5].htm

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OIPZWEW8\login[4].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YB8IB6GH\login[4].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\4420.tmp

    Filesize

    12KB

    MD5

    caa300673c11a7627a7b6346e1a93b61

    SHA1

    7ecaf36f1e150c478b6cfc3446ec7f0c662c071a

    SHA256

    42ae110a0ecd0d83c4f12314d42a585354b501856dc3c7b483123fcbc317f2aa

    SHA512

    f11f1182d2fdc14b2c64e2221091e318f76c9a41824977c1a93bf2077300bba919ca4a01c80340c4c20d239ac6dbadf091f544891f0ec72df62a6cc11231faa6

  • C:\Users\Admin\AppData\Local\Temp\5EE9.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\6ECF.tmp

    Filesize

    42KB

    MD5

    34129cd117e8462a6d399da97c7851da

    SHA1

    d3a9f436c244f879555348aecd719da44854f671

    SHA256

    1ece8a15db4b162ab8d851ec4c05b3154572f21d82d6a2edc629826439c14626

    SHA512

    d1a8571a73679770fccb206f70259a1cef8d69708c5a550225f2fa4197cd0b28fc4078cfb93fb5a864935f352424730405ae6334c0530fdfd7ab40a51ea9a95a

  • C:\Users\Admin\AppData\Local\Temp\6ECF.tmp

    Filesize

    42KB

    MD5

    3b2cdd7c30d56fc3805e4d564ff1fae7

    SHA1

    f3d7d47ecf936dadb653e67f8b4eb25dd3807ace

    SHA256

    5e72aeffaf836ec997a5ecff04592bdc2fe652d00febb1e65c5fdfef54e7c6a6

    SHA512

    22c55345c241da1e6f24ca91b8e37b4e32970fa1bf8f23359ec9ce22f4d025e371619eafdd2d7532d074b393a2cb20edfa5c574f2e6112d23436612437e6c796

  • C:\Users\Admin\AppData\Local\Temp\A0F4.tmp

    Filesize

    24KB

    MD5

    ff95dbc96c160a6fa75faf13e49b94bc

    SHA1

    1e60edb2880b347998f75999df0130706f018c3c

    SHA256

    91b3c37fa84ce8fa7b3f847a71f4af7352612085ceb5e1fb9c95f7cfc218c073

    SHA512

    507ed414720c3b2ceb7cb40775ec8cbf7d85a519695b0b5e3074a406698cd7737a94ee44304b6190ccdfe8e05b1724e3a9f2245580bf1205136ed8002e52e73b

  • C:\Users\Admin\AppData\Local\Temp\A147.tmp

    Filesize

    481B

    MD5

    1a97c1c3d9813d01f2847c572be3214e

    SHA1

    f1d42f2890c0003b97ed1a4f1d04139755b277ab

    SHA256

    6f5273b693de3b8af625554f981283adaa04d2898780c4b17bfa13b517f1c909

    SHA512

    4a234b1f431daf933f8d2d9896cee5b3cfe8952eabce309008e3661d46d54b4b49984254b0be404d88ef3f6cd63895a70cfb79b86214280b1367a3bad6be1032

  • C:\Users\Admin\AppData\Local\Temp\A169.tmp

    Filesize

    61KB

    MD5

    cdc49ff5b84c5842ad21639ed40fdfc2

    SHA1

    7a00eaab2b0dcd58a31fcc7eb1dcd2d44fc634b5

    SHA256

    184a215f70b317235f1399cbd279ca2f94a0c8807757261920163d7b59128931

    SHA512

    858754aba44e2e6b7592bbeb802c9a9469c2e803708aa9bbdc457d1851968af49606726f2314b98f9c8172145bc1f6a0f69a797b0f142360c6b032d7d62c241a

  • C:\Windows\apppatch\svchost.exe

    Filesize

    212KB

    MD5

    3fe392884362021ed3f6b0c1edc35e79

    SHA1

    33103007c0efce9ea201295a4e19b125956a7cc0

    SHA256

    23b32ecdcbeeb25c56904cac7430e6af789c3b95283bf3d240cc82de4ebc215e

    SHA512

    eb39cab409d013e97c4a7122fc7277cb4f1dcfeb269637371f756b92917db28aa52ea7dccd32d74bbe57544ef039b228adb14bea324edaa2a0188ef51f857bc5

  • memory/540-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/540-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/540-13-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB

  • memory/540-12-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/540-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/540-1-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB

  • memory/2772-46-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-34-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-71-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-79-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-77-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-75-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-74-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-72-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-70-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-68-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-67-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-65-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-64-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-62-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-61-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-59-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-58-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-56-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-54-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-52-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-51-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-49-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-48-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-24-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-44-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-43-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-41-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-40-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-38-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-37-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-35-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-69-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-32-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-31-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-29-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-28-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-78-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-76-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-27-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-73-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-66-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-26-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-63-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-60-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-57-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-55-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-53-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-50-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-47-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-45-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-42-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-25-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-39-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-36-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-33-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-22-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-20-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/2772-19-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2772-18-0x0000000002B40000-0x0000000002BE8000-memory.dmp

    Filesize

    672KB

  • memory/2772-17-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2772-16-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2772-15-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2772-30-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB