Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2024, 02:47

General

  • Target

    a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668.exe

  • Size

    1.1MB

  • MD5

    239b74d7ac38014e61cc335630ac22d6

  • SHA1

    ef7eacbab6cd35771675717a0a84939f529c1ac4

  • SHA256

    a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668

  • SHA512

    8a43731dd67421634928f30b6e1cff9638867d6a16bcdf93126526b3eaec64d2c9a5b98fa85f0b9be094c6efd300ccb020c48f8c9920fd88dd87a8b87ca04a4f

  • SSDEEP

    24576:L800kHPa2DfTNjx+mZCkt76f/24pN+XNqNG6hditW:w0riKf9Ckt7c20+9qNxUW

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668.exe
    "C:\Users\Admin\AppData\Local\Temp\a53ec0d01746cd6c44b9c207df3101c8fe7e78bbe08a125dad833b1a41636668.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    17a3048d6d04a6469efb0da199a2592e

    SHA1

    ed8d46753f4375467fcc1211334442403ba211cb

    SHA256

    d1668851f0dda5f26dba13f9a10aac4018951c5acecc25d730e79e23d8cde86d

    SHA512

    1a26167d5cf17eeb0398334b74ca8aa4c0b9849ccce5b57e7754ea77e680e23b53f9bf0c4b3d39eb6332f263836c3fc00536ddacbe4c4015d589a7b0a4fb0cc1

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    54d963a303f11ab43185094ab3c2e283

    SHA1

    098e473d09ca82828e8ffe5061157519d32822a5

    SHA256

    c416850b716521815b89a88e725c7aa0d721d16895f98b5bdb9a5e0b6b470a2e

    SHA512

    51ff63f344fa187661042cc6341f4eda7cd9651a851bd372989d7b856a6caa8430bb61824b97206ab2d61d8608de51f607e0cdbf6ec3194dd5e37af1a457854e

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\puzylyp.com

    Filesize

    58KB

    MD5

    cf7e8cf9f892d3c944d3bc50107588f0

    SHA1

    78c45c7251f3fd67ed762ab63e66d69b989b756b

    SHA256

    f9b3a80fb62e60f9944e8d459a13096550583d203ad377df2a03257a8f91f4ee

    SHA512

    e5d370318a7450d82370da54ec0c84005318f0d62dfa08ebdb4445ff2a53d3aa623226ea7bac36246bef12e7c8b002eb148bac31810cbd94af490c980a2d047c

  • C:\Program Files (x86)\Windows Defender\vojyqem.com

    Filesize

    1KB

    MD5

    380ef50970b99a245e9ae7f6ad4ff97e

    SHA1

    75ee0fc2b5c2fac82438f93845c69965122dbce2

    SHA256

    7c81607d98a23870205dbe5853b612f0e2b52b3bb307a611cfd071d2e65bfe67

    SHA512

    6f7d3a93d14ea19ad9ceab7d78cd20f31f542ae31854b66fc0400a1932b4fcf2c773b80c700d0408478eda61f9b66c34d2aa7d63b89a31a78946e73412bc4c7c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6IJLDY7V\login[3].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Windows\apppatch\svchost.exe

    Filesize

    1.1MB

    MD5

    972203f9822c0e86cdf46662ba6d3f38

    SHA1

    a5edf9ce5b3814aec8c42e99479a30929b6a39cc

    SHA256

    d2f2acf0a67bcdd84382f3d3c5f2f1cd666d6d3a99023de789a0bcdec0da1876

    SHA512

    5c8b35245c5dcade518ce4bbd348e26c204c756b08ac3bc9fdfc9706cc48a243c7e669996bf817cf3fc806f48b8599a2a16eec3876fc307e96514400161eed9d

  • memory/3056-52-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-46-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-24-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-23-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-27-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-79-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-78-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-77-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-76-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-75-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-74-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-73-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-72-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-71-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-70-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-69-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-68-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-67-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-66-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-65-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-63-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-62-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-61-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-59-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-58-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-57-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-56-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-55-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-54-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-53-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-51-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-50-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-45-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-20-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-48-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-49-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-44-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-43-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-42-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-41-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-40-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-39-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-38-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-37-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-36-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-35-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-33-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-32-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-31-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-29-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-26-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-64-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-60-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-47-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-34-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-30-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-28-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-25-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-12-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-13-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-18-0x0000000002DD0000-0x0000000002E74000-memory.dmp

    Filesize

    656KB

  • memory/4292-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/4292-1-0x0000000002220000-0x000000000226F000-memory.dmp

    Filesize

    316KB

  • memory/4292-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4292-16-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4292-15-0x0000000002220000-0x000000000226F000-memory.dmp

    Filesize

    316KB

  • memory/4292-14-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB