Analysis

  • max time kernel
    120s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:07

General

  • Target

    8891cbe6a69f77ce0813f8bc5edc481457ad0ea7cfd61dcc9f7a5f04b4ac181aN.exe

  • Size

    206KB

  • MD5

    060a5b0c6c592880f93458455bfcd240

  • SHA1

    99051a2a832a448efac5454914e22230727abfab

  • SHA256

    8891cbe6a69f77ce0813f8bc5edc481457ad0ea7cfd61dcc9f7a5f04b4ac181a

  • SHA512

    8bcfcd96b38f7f8e6b9dde98819df4045cecd5facccbc3c9b71eafb410900c00413967273b432d85a683f33085d5a9b577205990447f141c7b001ee1449fcab9

  • SSDEEP

    6144:d+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:d+U9qyFhJy56d/eoyXjn9W+

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8891cbe6a69f77ce0813f8bc5edc481457ad0ea7cfd61dcc9f7a5f04b4ac181aN.exe
    "C:\Users\Admin\AppData\Local\Temp\8891cbe6a69f77ce0813f8bc5edc481457ad0ea7cfd61dcc9f7a5f04b4ac181aN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    206KB

    MD5

    73cf7ade481550c6c1a66f63e806c6ff

    SHA1

    3751d0d5a53c25db5cc690d15e0182466293ea37

    SHA256

    ed4e3c24e86474399590e123647534e9ae96e77e97a6445f7796ece6f077e2c0

    SHA512

    79b73294a4bd304a46aaa3baa2412feb01d3c65b44ff9907aefee80eb6b2df47cc0c7e362eeaa462974d7975d9df0a5680e8013406c6d532f768ec238257d1e4

  • memory/2436-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2436-1-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/2436-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2436-16-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/2436-17-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2436-14-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2664-18-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2664-15-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2664-19-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2664-20-0x0000000002D90000-0x0000000002E3A000-memory.dmp

    Filesize

    680KB

  • memory/2664-21-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2664-22-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-26-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-24-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-34-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-38-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-81-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-80-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-79-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-77-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-76-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-75-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-73-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-72-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-71-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-70-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-69-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-68-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-67-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-66-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-65-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-64-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-63-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-61-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-60-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-59-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-58-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-57-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-56-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-55-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-54-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-53-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-52-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-50-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-48-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-49-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-47-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-46-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-45-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-44-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-42-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-43-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-41-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-40-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-39-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-37-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-36-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-35-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-33-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-32-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-31-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-30-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-29-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-28-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-78-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-74-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-62-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-51-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB

  • memory/2664-27-0x0000000002F80000-0x0000000003037000-memory.dmp

    Filesize

    732KB