Analysis

  • max time kernel
    50s
  • max time network
    147s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/04/2025, 08:51

General

  • Target

    JaffaCakes118_c21774e5259398d4f12e056a2967bb89.exe

  • Size

    259KB

  • MD5

    c21774e5259398d4f12e056a2967bb89

  • SHA1

    4fa81a3131b9dcfacc83e9b46f15f7553f119c77

  • SHA256

    d24effd9ef0c7cf1f3bda665c2ac16efe43f3cbe1b9968c2900bdd8d6f929016

  • SHA512

    ece659e1ab84bf87962ae8499a7acb522827d3d14cd6a336dd59e0492530e078a044e9214636184f99cb29184353b18fd3774ba1f0a4ad54be7a14aece290f2c

  • SSDEEP

    6144:97UXuxP/rOEMS4s6CqQUDdF2uLCyoUC9e2voN:NzyShqQUDdF2uaoN

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c21774e5259398d4f12e056a2967bb89.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c21774e5259398d4f12e056a2967bb89.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3048
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c21774e5259398d4f12e056a2967bb89.exe
      C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1640

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-56-0x0000000000400000-0x000000000065B000-memory.dmp

    Filesize

    2.4MB

  • memory/1640-121-0x0000000000400000-0x000000000065B000-memory.dmp

    Filesize

    2.4MB

  • memory/3048-75-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-82-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-6-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-4-0x0000000002600000-0x00000000026B2000-memory.dmp

    Filesize

    712KB

  • memory/3048-3-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/3048-12-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/3048-2-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/3048-10-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-77-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-95-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-94-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-1-0x0000000002510000-0x0000000002577000-memory.dmp

    Filesize

    412KB

  • memory/3048-72-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-91-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-90-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-88-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-86-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-84-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-83-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-80-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-81-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-79-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-78-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-76-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-5-0x0000000000400000-0x000000000065B000-memory.dmp

    Filesize

    2.4MB

  • memory/3048-0-0x0000000000400000-0x000000000065B000-memory.dmp

    Filesize

    2.4MB

  • memory/3048-93-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-71-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-69-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-68-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-66-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-65-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-64-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-63-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-62-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-60-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-59-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-58-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-97-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-96-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-92-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-89-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-85-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-74-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-73-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-70-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-67-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-61-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-57-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-8-0x0000000002BE0000-0x0000000002C98000-memory.dmp

    Filesize

    736KB

  • memory/3048-123-0x0000000002510000-0x0000000002577000-memory.dmp

    Filesize

    412KB

  • memory/3048-124-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB