Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 04:12

General

  • Target

    6b0c776451b5e587e5425c4c50094c7255685dd02221b59bfa01866efeea92ffN.exe

  • Size

    218KB

  • MD5

    a9bfc1f9bd3662618b12584ffa000f60

  • SHA1

    4dfa4c0a71200c18c171a99c294c1f05d356d93d

  • SHA256

    6b0c776451b5e587e5425c4c50094c7255685dd02221b59bfa01866efeea92ff

  • SHA512

    2a784ab0f13e4af747c16af847b6b92b17acd0eaffd448cc1c0af84da40b1b86a60ba81732c79ac362d4bbe7fa2b3dd50027c509def8360b42b6864fdbed9a6f

  • SSDEEP

    3072:4vm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:21SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b0c776451b5e587e5425c4c50094c7255685dd02221b59bfa01866efeea92ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\6b0c776451b5e587e5425c4c50094c7255685dd02221b59bfa01866efeea92ffN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HOI3BGS3\login[4].htm

          Filesize

          593B

          MD5

          3b03d93d3487806337b5c6443ce7a62d

          SHA1

          93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

          SHA256

          7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

          SHA512

          770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\login[1].htm

          Filesize

          162B

          MD5

          4f8e702cc244ec5d4de32740c0ecbd97

          SHA1

          3adb1f02d5b6054de0046e367c1d687b6cdf7aff

          SHA256

          9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

          SHA512

          21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

        • C:\Users\Admin\AppData\Local\Temp\A413.tmp

          Filesize

          24KB

          MD5

          edae11ac3f8d6708021318be0b9d23ac

          SHA1

          010a4e904831ee2614f54dd5a6e86a2481eba2f1

          SHA256

          fb1e13bf1a5bfbc2c3607f0d6de50aa468630f74e48d0bc20106dda71dff2947

          SHA512

          017f11da2ad2a54c5a909d76aeef16466a3ba0c0b4f5db1e3fc55960ce633497c12e32a49e064514a38d9256f241ff1f59e88ef1d1f4a3d22af6fdee7d95f678

        • C:\Users\Admin\AppData\Local\Temp\A4B3.tmp

          Filesize

          2KB

          MD5

          89335343afbe6c4a334100b95e16dc07

          SHA1

          9ff632d51d0eda67b39c674a5b74214c69b1a5e6

          SHA256

          ee99c8eabd96161a920f5732d434c102282c4f03e0ce61f1cf1c012ea6907c88

          SHA512

          36c08e80ca3e36cf6f8a8cbaefce6cbfacadb793921db50ed2bc4e82fe95f132b3b77af513b962ac9f6273359197e22758058420b0c4a289b39c3ba15556aca9

        • C:\Users\Admin\AppData\Local\Temp\B356.tmp

          Filesize

          593B

          MD5

          926512864979bc27cf187f1de3f57aff

          SHA1

          acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

          SHA256

          b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

          SHA512

          f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

        • C:\Windows\apppatch\svchost.exe

          Filesize

          218KB

          MD5

          31267e5014347ac623903619096f5163

          SHA1

          037b194f1d2ae9dbfc91b4667873808ba8a26dc4

          SHA256

          928d2710f2c09263a9fd0d800738636771959c05f1b0d48cccb53c5d19900d60

          SHA512

          843315820a2d47377e2a69553b7ff7ff6186ddbc96243533b569afa7ff3710b4b9893a04c8d352b89e1baf58513170601456fbf7cc6791e5f03e7f2fcf519b6d

        • memory/2056-0-0x0000000002670000-0x00000000026C1000-memory.dmp

          Filesize

          324KB

        • memory/2056-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2056-13-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2056-11-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/2056-12-0x0000000002670000-0x00000000026C1000-memory.dmp

          Filesize

          324KB

        • memory/3776-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-16-0x00000000028D0000-0x0000000002978000-memory.dmp

          Filesize

          672KB

        • memory/3776-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-17-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/3776-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-15-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/3776-14-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/3776-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/3776-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB