Analysis

  • max time kernel
    111s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 07:19

General

  • Target

    7c2560d27ba7db46f7336c3c2c5f5585b35e2378984eef77ef7de209c5a39b7aN.exe

  • Size

    355KB

  • MD5

    571e61844fc14ad4b7119b7b8d7f6e40

  • SHA1

    5179a197b3c43e263b6fb287fa18899dcb805e7f

  • SHA256

    7c2560d27ba7db46f7336c3c2c5f5585b35e2378984eef77ef7de209c5a39b7a

  • SHA512

    cc3d7287fcc4d9ed87785d6b22e2999c3ba02f28e5abcdb0919ba22f745a8f51a5ed5cd7144d3cad8ca1a180c21c00a7ec9815997fca3dbb648226eba1fc41ce

  • SSDEEP

    6144:73EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:YmWhND9yJz+b1FcMLmp2ATTSsdS

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c2560d27ba7db46f7336c3c2c5f5585b35e2378984eef77ef7de209c5a39b7aN.exe
    "C:\Users\Admin\AppData\Local\Temp\7c2560d27ba7db46f7336c3c2c5f5585b35e2378984eef77ef7de209c5a39b7aN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\login[2].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\466E.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\5667.tmp

    Filesize

    24KB

    MD5

    d2384b8514d55bef0497d5ac9ff41d1e

    SHA1

    381628ea425b92c73b0d29f7b0b8701859af69c1

    SHA256

    6b168fe721978ffe789541e99f3bfb0fc061ced954e17aa56af028f6aa23e76c

    SHA512

    48f27df3fb6b939ccfba59cdaa13cbc8e31fab37ef53128d34ae86276a684c1c15b6ee6423b1f12c4782ef9133c698afc40fd1138059d353519b6a7dd847d1a0

  • C:\Users\Admin\AppData\Local\Temp\56B9.tmp

    Filesize

    42KB

    MD5

    6b7f3c767a7f2d7e507adda1fde7f479

    SHA1

    3665f86872c483e5eddbac62e9054e3b33e0ca84

    SHA256

    dd9c91fd74b4ba7584a4f8b4ab102d9e473bfd5317369a372ff5e12e87aa2dcc

    SHA512

    f3b30f413230232c47b01ed39d3886a0d57d045b939f05dae27013983fcfddff8802937a7daab0afa521b408389b7422c696f378cebb39c6b703a7a45b58c786

  • C:\Users\Admin\AppData\Local\Temp\56B9.tmp

    Filesize

    42KB

    MD5

    4ca58273f5e0912e9add8d2aac10753e

    SHA1

    b4dcab000e0b81df4b4d5e7e2a9a138b85108298

    SHA256

    d070b6de936507058571a537de483e1b81fa30087255494ad32b5c56fbdeecbf

    SHA512

    7276d0972a0d6d2cc111d03e9c1a3b334f5982c0d4411b941dfc5df64e245a5060f6063d51edfb1a0bdab377148570d4ffa30b389196e657bb2e78cef239798e

  • C:\Users\Admin\AppData\Local\Temp\D920.tmp

    Filesize

    58KB

    MD5

    5e1101a159c04026c7a46a34ef4d4029

    SHA1

    42a2a3df5e5d4b2288e1c89c2019accd5d0ed53d

    SHA256

    e6488b1ca6bafc7bc868de6ff604da98e410191a391f046b1723f9a5c60a1e1f

    SHA512

    a2adf8ec60635c79d9a8ccea69b2a8115a1503f688667541121ad8f07369c139c3be03c5e9d283e4d9fc07dc910d0e762b63593e0410f77a7378c64fab134cd0

  • C:\Users\Admin\AppData\Local\Temp\D9B2.tmp

    Filesize

    481B

    MD5

    8e6617dec486c061ecdc162471acc4f9

    SHA1

    c54ecd2d30e2eafdab0b5e8219310ac70f12c4a4

    SHA256

    f1ed9caebb0c71b47042e522e5777c3ab078ced38443d72c52a66564a7d341a7

    SHA512

    6fdc8cfeb450998075db744b9681a3674a303e65d27a593157dc57b2d4fea806e9854ac5140262720b96b7aea460ae14809693315766e3cc4a56924785f0ffef

  • C:\Users\Admin\AppData\Local\Temp\EF9F.tmp

    Filesize

    24KB

    MD5

    22d27abad19423070b1267a6f4ad470e

    SHA1

    77939764cfa98c01a4d8c2b10cadda604f5afd17

    SHA256

    206ce3b1d04c9411910f2eb42772ac65f814e9dd0f4385ca9264fa261b700307

    SHA512

    86ffdd2fb203ddbc063bd1415898130aea909f687ee7a5e7ade4e0c58f8bccb620605a0a507a24226c5bdd02f4c5af535968549dacb976093f34941c7c45f23f

  • C:\Windows\apppatch\svchost.exe

    Filesize

    355KB

    MD5

    164a15eae31792765e78cad4342e78ee

    SHA1

    6274c36c0f071f7bc8f8d19e853a84647d007646

    SHA256

    86f7473a8107506b57f2f459f0e040e3f15a57492ba27876ab57dc0fd926fd16

    SHA512

    6014e8ee81aeef8bc044568c326454ab421b44a5ac8244147355f03aea022d2e4889c2be7ca3c3a0c6be92c5f00adff6a4a7bbb93344336c30d49dcdf260e25a

  • memory/780-9-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3108-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-11-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-10-0x0000000002720000-0x00000000027C8000-memory.dmp

    Filesize

    672KB

  • memory/3108-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/3108-183-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB