Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 07:08

General

  • Target

    fb2278c9953ef4c1a8a04a730e52b23c7230c37af897b93d783cc67231a4c891.exe

  • Size

    212KB

  • MD5

    78d19bed6d452f66b29304e1f63d0202

  • SHA1

    3e13880edc8eefb8daad2218b52ca3a906eef4cd

  • SHA256

    fb2278c9953ef4c1a8a04a730e52b23c7230c37af897b93d783cc67231a4c891

  • SHA512

    93feeba9ccc88668b8bf67fdac03c44e6b788a494441795a8d270baa32b4ba99a478aaa5d402d8d9be4491f2e92dceed38336d338885464762c99cd96cf2837e

  • SSDEEP

    6144:xob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4G:mboEj/8ASWM4Ki96/zqIKG

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb2278c9953ef4c1a8a04a730e52b23c7230c37af897b93d783cc67231a4c891.exe
    "C:\Users\Admin\AppData\Local\Temp\fb2278c9953ef4c1a8a04a730e52b23c7230c37af897b93d783cc67231a4c891.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\860D.tmp

    Filesize

    24KB

    MD5

    9306a979e08908eeef391dfbcae48e93

    SHA1

    3b3451ae48b9849e4c1f5069f5947463b05e30ee

    SHA256

    12816e1debfe0eb1b8eda9a2f9c1fb14d1ccc4643ea27767c96a597410af1d34

    SHA512

    f047d2cae7648c62d2cb6476752439399674182d0cba9ed03afea0cbf8b44850596654f486ab3a0b5f3adde993e9c4990b2012a8182315a26e2468ac6d06142a

  • C:\Users\Admin\AppData\Local\Temp\8650.tmp

    Filesize

    481B

    MD5

    f39d4656f266f148d7e9aa69d474740c

    SHA1

    fdbdacc835c077cc66ec374fcf39ee636fcbc411

    SHA256

    82ce46d77269bdad913486d38e54ddfd1599aabd8a28e598bb0af5e06a285a2a

    SHA512

    eae9763ce0a1c1f06ab81430183b850a0ae28f05888275f45e61a529de9aafeae7fb5b8a424eaacc7d1fad64424b173a7613fe0e040e90880fb548145ef8befc

  • C:\Users\Admin\AppData\Local\Temp\896C.tmp

    Filesize

    24KB

    MD5

    cf905d7d4b25504a6eaa76295159eab4

    SHA1

    c4c34b7597138989afb18d427545003cfe50e35e

    SHA256

    a756c7881857569af5e496c6b7d00166d6c6877fd9771da4d70f3cb401b67943

    SHA512

    f0a9c8a75e12945c799b8c178652d69ea03a3805419d5d9ecc07162b40a574027e75e4aa2dcba7e62dcd613cb7676608958f51d14bb0a31b0d8a2db69cb87486

  • C:\Users\Admin\AppData\Local\Temp\89CE.tmp

    Filesize

    1KB

    MD5

    5f0e5dad61a93d4f346e5943a5a804a2

    SHA1

    2f84b52c6c67dba0a30ae506b75a00c21a2a3146

    SHA256

    78cd82fbe4483eb6df0d13a5d79b8c776f8d35a0c44ccd29a6fec276ec72af2f

    SHA512

    a3d8ede6b6b163bf60dedefca2319f14677122cbf237ad1610e23856f18ea306b5addec08e38cf311b94c78dbc24d673cb3f31f4a8e0813c97b68dbf2789a6c6

  • C:\Windows\apppatch\svchost.exe

    Filesize

    212KB

    MD5

    d6984908e765c0f3f7d57cc4a50800b7

    SHA1

    ac8908785f1ed0546761470a98a555efec85801e

    SHA256

    d03d4c6f6e88f3cbefca1a75ccd6487e427c1f8b6f09a59973d57c1748c07c27

    SHA512

    1be1fb50fd51842c12145cbfea133b380ce5e474ee88728534c7791e0ebe034723e197fbd84cddef7ca4ab920f952128e552200311a382b52f631b24ef66cbac

  • memory/2860-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2860-1-0x0000000002340000-0x0000000002391000-memory.dmp

    Filesize

    324KB

  • memory/2860-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2860-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2860-14-0x0000000002340000-0x0000000002391000-memory.dmp

    Filesize

    324KB

  • memory/2860-12-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/4344-62-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-54-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-19-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/4344-20-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-24-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-22-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-36-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-28-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-37-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-79-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-78-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-77-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-76-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-75-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-74-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-73-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-72-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-70-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-69-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-68-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-67-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-66-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-65-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-64-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-63-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-17-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/4344-61-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-60-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-59-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-57-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-56-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-18-0x0000000002B40000-0x0000000002BE8000-memory.dmp

    Filesize

    672KB

  • memory/4344-53-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-52-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-51-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-50-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-49-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-47-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-46-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-44-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-45-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-43-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-42-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-41-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-40-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-38-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-35-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-34-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-33-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-32-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-31-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-30-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-29-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-27-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-71-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-26-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-58-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-55-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-48-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-25-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB

  • memory/4344-16-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/4344-13-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/4344-39-0x0000000002D30000-0x0000000002DE6000-memory.dmp

    Filesize

    728KB