Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    16-02-2025 04:00

General

  • Target

    JaffaCakes118_ff44a13772793526fe0819eed0ec71d3.exe

  • Size

    266KB

  • MD5

    ff44a13772793526fe0819eed0ec71d3

  • SHA1

    c864b2e5e348edcf0bc5822c6d6f485e3e7192e4

  • SHA256

    e35a13f0e39b8f0821bb9d403758bfd776126dedb870a0914d1374ac90aa8b5d

  • SHA512

    e990c7b6852c25bac66dbf58806c4b83f89f4636be48476071bcf3d47e9f5294af6da302972562f506f67ca9d060e16ba1e26012a27cb7824511b6863705e134

  • SSDEEP

    6144:nLZvT5kuch1RbwHwpmRTamIhUgVZbap1fqFrge4fr51zpTM:tfch1RPpmRTam4jbaAglnzq

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff44a13772793526fe0819eed0ec71d3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff44a13772793526fe0819eed0ec71d3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-0-0x0000000000400000-0x0000000000753000-memory.dmp

    Filesize

    3.3MB

  • memory/2960-1-0x0000000000260000-0x00000000002B4000-memory.dmp

    Filesize

    336KB

  • memory/2960-2-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2960-4-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-6-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-14-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-12-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-15-0x0000000000400000-0x0000000000753000-memory.dmp

    Filesize

    3.3MB

  • memory/2960-10-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-8-0x0000000002240000-0x00000000022F2000-memory.dmp

    Filesize

    712KB

  • memory/2960-16-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-18-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-20-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-42-0x0000000000260000-0x00000000002B4000-memory.dmp

    Filesize

    336KB

  • memory/2960-43-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2960-46-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-50-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-49-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-48-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-69-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-85-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-51-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-52-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-47-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-53-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-55-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-54-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-56-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-59-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-62-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-70-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-78-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-89-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-88-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-87-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-86-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-84-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-83-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-82-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-81-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-80-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-79-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-77-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-76-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-75-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-74-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-73-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-72-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-71-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-68-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-67-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-66-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-65-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-64-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-63-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-61-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-60-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-58-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB

  • memory/2960-57-0x0000000002B30000-0x0000000002BE8000-memory.dmp

    Filesize

    736KB