Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:29

General

  • Target

    273f329157240081d9f5188b34d2ee48ee812593dcfb3e27142642ed1d51da81N.exe

  • Size

    711KB

  • MD5

    e90f568a0e48d2f12a39b28bbd0d3ec0

  • SHA1

    533b490046adfb0b6df4302e387291b819ba3f81

  • SHA256

    273f329157240081d9f5188b34d2ee48ee812593dcfb3e27142642ed1d51da81

  • SHA512

    16f5f267abd020e98990956fc33d1a783dd298acb1cbb2d99d1b218dbab879d42b488744c091e3e3bc64a7b6b11551760d18416b78addbb07886fc785960ea93

  • SSDEEP

    12288:gmWhND9yJz+b1FcMLmp2ATTSsdNmWhND9yJz+b1FcMLmp2ATTSsdS:gmUNJyJqb1FcMap2ATT5rmUNJyJqb1FB

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\273f329157240081d9f5188b34d2ee48ee812593dcfb3e27142642ed1d51da81N.exe
    "C:\Users\Admin\AppData\Local\Temp\273f329157240081d9f5188b34d2ee48ee812593dcfb3e27142642ed1d51da81N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6951.tmp

    Filesize

    42KB

    MD5

    76f38be2304c43d149724a66bdb29e2f

    SHA1

    6f535e44a994a93c0f74aaa4ef58178d8b204443

    SHA256

    991149e3f84f98b83191e85b4e3151c2a2ac7c92b3405e2b9b626d428c73017e

    SHA512

    8111bbfecf71623afd2c31656d476c0eea72b348aa8fecd275f904e90e745813c84152dfe469ba142459a2d4a044994846e6f6d29480c336830c29c1b49663ac

  • C:\Users\Admin\AppData\Local\Temp\6992.tmp

    Filesize

    60KB

    MD5

    33930fe47904bbf6c5b1b65ff1b75f39

    SHA1

    040d757fd25f3f0185b1067f7ce6cbd895d34e11

    SHA256

    15e97cf599eaad2f6ae1e3246c5ed8260dc14e86d5a67d72b58b7b1a95dcdedd

    SHA512

    f015b9708f825592c2e56727a659390ec5d4102f75912126291d398c09764866d32420054f02f97462298fe81f1c28e3f55c7abd13a3351ffa5f619138c3f90a

  • C:\Users\Admin\AppData\Local\Temp\6A3F.tmp

    Filesize

    481B

    MD5

    3625b68de85cd84f770c27231fb07319

    SHA1

    f3c6aaa31e6222a7b7eac09fb44b8fbac558c83e

    SHA256

    365165933a224371d8a1708e0ee119df0d137ef826f6839746c4cb35fc2e3e37

    SHA512

    d91667b7b68d651765c1c2d9349f63905bc51868a355f6d6c4ca614ab8c6a1b2b33d78d948129ea9332fcba61164c090173d0aa07fdd23691ed629047ec3a685

  • C:\Users\Admin\AppData\Local\Temp\7DDB.tmp

    Filesize

    1KB

    MD5

    30cb1cb11e0951311344b9ce14e58e5d

    SHA1

    2b8675d37d231b1db808758169c3307abccc37f5

    SHA256

    0685048a8a7848ba0e7186f3d207a1e4397f60c9d61fa4b435fce5a27edb0cc5

    SHA512

    98cd01eb8f03d7d3d526cfb90fb4b35b1f8fbad2c6a2d31ce37dc29d7cbc856c9a956e4087ff5c4ada19a5fd474b56731506e32328a9511b7523f275160d7c12

  • C:\Users\Admin\AppData\Local\Temp\D40D.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\D40D.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\ED79.tmp

    Filesize

    481B

    MD5

    8e906445337eba6c3ebe5489873a8a09

    SHA1

    6cc8b6c1a71ce5e659bcc6c83d33e5b695e818c6

    SHA256

    25d2431325bb3118ac9cb7b923540e842685d3e662e0f08e19735120b94138d6

    SHA512

    a67883e4218e81c5bd7ba2b4832bc7e919607e6565dbffb57a67dc228f419ab79166ea790206e322d34df8dd3521a269b22b0df2419004c2bfe90452e55dee72

  • C:\Windows\apppatch\svchost.exe

    Filesize

    711KB

    MD5

    600394015c159f4b355ac61b749f5fb6

    SHA1

    e9d99a3576cf3f5fe48bb024d8bf6937c4ebf915

    SHA256

    d3892010b1ccab631a5a7a2784f1aa9b5b8077850548600b0fe8c1cff7d45582

    SHA512

    693ab60c9f60a3fd1479b6723de03377427542e973e024ea64623987005cc94613ca125213f45f485158185d97c5cc81e915eafdf4afc2d4c4bbcabc2300671f

  • memory/2028-9-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3884-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-177-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-11-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3884-10-0x0000000002720000-0x00000000027C8000-memory.dmp

    Filesize

    672KB