Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2024, 10:44

General

  • Target

    67e4d33af8f301f2d29f8590daa304af87a0632a3fc340943046109e2df9b605.exe

  • Size

    204KB

  • MD5

    af7cdc0ac5aa9e9dbbdf200d2a37494c

  • SHA1

    7d6c20ce49fd797db10ee8e03efebb338ce5ff5a

  • SHA256

    67e4d33af8f301f2d29f8590daa304af87a0632a3fc340943046109e2df9b605

  • SHA512

    09d19c44b57db182ac72ab0b9b4b6b5caef73928232b8e98b18f679fee1b6282c4ece2352869d698c84c2b503806d822699162b8d554bb5ee45ca25ea01d4195

  • SSDEEP

    3072:xdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFUc:jGazIc6TVBMrOpzeJEsuirSGEMpgEk

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e4d33af8f301f2d29f8590daa304af87a0632a3fc340943046109e2df9b605.exe
    "C:\Users\Admin\AppData\Local\Temp\67e4d33af8f301f2d29f8590daa304af87a0632a3fc340943046109e2df9b605.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    204KB

    MD5

    ad112ab5a71212d1bba870a20cf1b702

    SHA1

    e4fc45390a01922c2451756a580ef7da928e6a9c

    SHA256

    4b1421b91145d45a61733d4af7fad1bf2d5c0f5f9a31c58329e844618f39060f

    SHA512

    a295ee1518721f6244e657587d2aff3e6369af69e3f07067dc6baf49f3c75afe78ffab0a962618c072dc06a8f49f3800d9d585f5acc6fca465f0cd0431e5eb1b

  • memory/2400-57-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-55-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-18-0x0000000002470000-0x000000000251A000-memory.dmp

    Filesize

    680KB

  • memory/2400-19-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2400-28-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-33-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-20-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-24-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-22-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-26-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-81-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-80-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-79-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-78-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-77-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-76-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-75-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-73-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-72-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-71-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-70-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-69-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-68-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-67-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-66-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-65-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-64-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-63-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-62-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-61-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-60-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-59-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-58-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-54-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-17-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2400-56-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-16-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB

  • memory/2400-53-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-52-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-51-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-50-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-48-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-47-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-46-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-45-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-44-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-43-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-42-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-41-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-40-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-39-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-38-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-37-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-36-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-35-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-34-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-31-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-32-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-30-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-29-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-27-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-25-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-74-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/2400-49-0x0000000002C40000-0x0000000002CF7000-memory.dmp

    Filesize

    732KB

  • memory/4828-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4828-0-0x00000000021D0000-0x0000000002222000-memory.dmp

    Filesize

    328KB

  • memory/4828-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4828-14-0x00000000021D0000-0x0000000002222000-memory.dmp

    Filesize

    328KB

  • memory/4828-13-0x0000000000400000-0x000000000048E000-memory.dmp

    Filesize

    568KB