Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2025, 18:49

General

  • Target

    JaffaCakes118_0d8e7754bf0b8f048fe96571b269a913.exe

  • Size

    210KB

  • MD5

    0d8e7754bf0b8f048fe96571b269a913

  • SHA1

    cab59493a4dce1c97bb57ea2741e751f7e4241fe

  • SHA256

    b189bfffa07f467f6f08d381702c589b2aa99c76f41fae853d8247de857c5f89

  • SHA512

    c7e291fe5d19c9676baf2e542a7adaf78294842894231aa7ee527d65b4a5209564f4d0d2500061b61e91ffdf663e85ff35566cf94901d7875121dd3cc658a080

  • SSDEEP

    6144:5NS5VmS/+PRHgzKmHMyTTaPrPXa3rkO2E1eJ+p:5IaxgzKmRUs+Oe0

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d8e7754bf0b8f048fe96571b269a913.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d8e7754bf0b8f048fe96571b269a913.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    210KB

    MD5

    3bc18d8a388f575f1645fec14fe309c6

    SHA1

    5d54c03cf6ee96d5155c130d69ad095cc991c8d8

    SHA256

    bdcbec111ee177a51d959bada0a20259d752f2ef0e37aef4510d10481b760d91

    SHA512

    5d8e854d25bc439837dc254e32ed6d3f716a79e2dbf6cf596a2878e57edddcd451fa928300a8e2c429b2a619571ddab793adfc3cc9d4d0826447ba3dbe7f28bb

  • memory/1748-0-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/1748-1-0x00000000003A0000-0x00000000003F2000-memory.dmp

    Filesize

    328KB

  • memory/1748-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1748-19-0x00000000003A0000-0x00000000003F2000-memory.dmp

    Filesize

    328KB

  • memory/1748-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1748-18-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2032-21-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2032-22-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2032-23-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2032-24-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-26-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-34-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-32-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-35-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2032-30-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-28-0x00000000025D0000-0x000000000267A000-memory.dmp

    Filesize

    680KB

  • memory/2032-36-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-38-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-40-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-52-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-54-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-86-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-85-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-84-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-83-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-82-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-81-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-80-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-79-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-78-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-77-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-76-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-75-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-73-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-72-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-71-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-70-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-69-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-68-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-67-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-66-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-65-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-64-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-62-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-61-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-60-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-59-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-58-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-57-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-56-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-55-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-53-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-51-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-50-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-49-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-48-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-47-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-46-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-45-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-74-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-63-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-42-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-44-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB

  • memory/2032-43-0x0000000002780000-0x0000000002837000-memory.dmp

    Filesize

    732KB