Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 03:28

General

  • Target

    a5473367003595b2d8a370ce95a8ade09bd1c8f7b22b10cbde83022f341928aa.exe

  • Size

    208KB

  • MD5

    777e60853d32b173bb5446d74243f397

  • SHA1

    9af4fb89b95d4cb84651ab0e070411b49fd171d1

  • SHA256

    a5473367003595b2d8a370ce95a8ade09bd1c8f7b22b10cbde83022f341928aa

  • SHA512

    fdb2331b18c14e4155c3ed5c40b672fc7a1d2cabe691dd4ef364b8ea182ad25e47c00364f09b531dcb28f965f59f66ff22b4c6e3ddd6787a1c56fb6b1e0069dd

  • SSDEEP

    6144:Ja1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfk:JbapK0JCmRcU9vVokf

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5473367003595b2d8a370ce95a8ade09bd1c8f7b22b10cbde83022f341928aa.exe
    "C:\Users\Admin\AppData\Local\Temp\a5473367003595b2d8a370ce95a8ade09bd1c8f7b22b10cbde83022f341928aa.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BFCD.tmp

    Filesize

    481B

    MD5

    6bd3660d8fb9d2bf292cf07c293d1b61

    SHA1

    f1e7b5f24f4b830374b1c5486be465b15c487ccd

    SHA256

    a3c13ac044a64010915f0f56ce10ef2bf28dca2cc4250f7513c8b6c9e53b3c17

    SHA512

    dddf74d62babe9e365b8965dea09835053e035e6425d1816227cd869d4e3c62fdf45b0daeeeab7f34cb8ce878429f950ee586babd8a1ab45aada8b2f7ca24d93

  • C:\Users\Admin\AppData\Local\Temp\DDBC.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\DDBC.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\EF59.tmp

    Filesize

    62KB

    MD5

    a49917212f87fe89f14ab0891f9f6508

    SHA1

    9ca9c56f064c0757518af53b2d24e00ce921b890

    SHA256

    07b9aac6e7480218a2b8b81a91f76c65fdce7a2bf4655f54f5408999fa6412a3

    SHA512

    0ef55b80f5797cedef2e4b40931d46226dc69ebf25b77499fc91563b80338c13cfc0756b6dffcf19e4f7ee7d0471388a3578756cf607bf8f6d94439865b62565

  • C:\Users\Admin\AppData\Local\Temp\EFBD.tmp

    Filesize

    481B

    MD5

    6b80caf5d6cd48974709e2734a4e4de9

    SHA1

    9c98fd829f3cc1a8b4721447606cbec02bc94b31

    SHA256

    597f1a2f367d0feee845f822a30733effa5056a0c12ecd5329fada18422000dc

    SHA512

    94114cc139401e9ab8e592e374da09680fb0d4e70061c0b2fd4023e042476b9f937d2e1299e9bc6b56969767cb06c94545fb963d3fed1858dba499c2030a1274

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    2ac7b89854fe6cba9d97bf47850b4025

    SHA1

    edfabab06d876854b0399dc821337d07a85cb95e

    SHA256

    2b1d9f373b6c3b8fc802a8d2e97ef9521c5205ecbe48ae38be814e0a66462d1e

    SHA512

    cc0a796da7d728b2843a338cb0bf994b364860748b4920f07544289d931e767cd492f14c9826564f76be6791519b6aec9455c3a4d1430a806bdd711c1975894c

  • memory/1916-0-0x00000000021C0000-0x00000000021C3000-memory.dmp

    Filesize

    12KB

  • memory/1916-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1916-11-0x00000000021C0000-0x00000000021C3000-memory.dmp

    Filesize

    12KB

  • memory/1916-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1916-10-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5064-60-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-54-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-17-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5064-18-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-22-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-20-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-43-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-45-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-79-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-78-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-77-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-76-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-74-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-73-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-72-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-70-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-69-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-68-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-67-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-66-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-65-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-64-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-63-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-62-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-61-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5064-59-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-58-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-57-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-56-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-55-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-16-0x0000000002A00000-0x0000000002AA8000-memory.dmp

    Filesize

    672KB

  • memory/5064-53-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-52-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-51-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-49-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-48-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-47-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-44-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-42-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-41-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-40-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-39-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-38-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-37-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-36-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-35-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-34-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-33-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-32-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-31-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-30-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-29-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-28-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-27-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-26-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-24-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-75-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-23-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-71-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-14-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5064-50-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-46-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/5064-25-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB