Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2025, 10:56

General

  • Target

    JaffaCakes118_0b6b8dd882701c235f733eb5a16e0f90.exe

  • Size

    254KB

  • MD5

    0b6b8dd882701c235f733eb5a16e0f90

  • SHA1

    b5cb7d2f89c749b30e442989c49bd6dd50696262

  • SHA256

    7148b0629ac39b7590e39fccfef48904adbdbfbe62da9b29919db17159d41971

  • SHA512

    196d480e4c81aec69b76e912722a8468801ce3cf36c3a09e2e6e77f77fc1e031c25b870ca992fba009f18907e8a043b69ab37a0fdf4657a194647c82ef368bae

  • SSDEEP

    6144:ItXMlItuudNc6ZrvLuHFd12YssRe0E3F9hdSxQUSWg:IBMsdNcYvCH5PssrifhsxQKg

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b6b8dd882701c235f733eb5a16e0f90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b6b8dd882701c235f733eb5a16e0f90.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x000000007FDE0000-0x000000007FE49000-memory.dmp

    Filesize

    420KB

  • memory/2172-1-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2172-2-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/2172-3-0x0000000002910000-0x00000000029C2000-memory.dmp

    Filesize

    712KB

  • memory/2172-4-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2172-5-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-7-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-9-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-46-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2172-11-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2172-63-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-66-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-65-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-64-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-62-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-61-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-60-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-59-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-58-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-57-0x0000000002AD0000-0x0000000002B88000-memory.dmp

    Filesize

    736KB

  • memory/2172-136-0x000000007FDE0000-0x000000007FE49000-memory.dmp

    Filesize

    420KB

  • memory/2172-144-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB