Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 10:26

General

  • Target

    e88a6dc649e7fefc6235169d82384737674493bdaa06113c2340bb5067360c35.exe

  • Size

    201KB

  • MD5

    42d4155c50e498dedcc051f0b0d713ed

  • SHA1

    5500a337db9f00f0da90989a3a0a0b796b649b33

  • SHA256

    e88a6dc649e7fefc6235169d82384737674493bdaa06113c2340bb5067360c35

  • SHA512

    a7b50748482f18f1d1ea7bf95291c47383651bf6cdde525d314487d8fdb4c93282ddf889a5cbc18a61cb9917b4f49183c0c2ab20dd62d0a1def638b31fceef64

  • SSDEEP

    6144:lt++Jbojf5Vq5OC4qZhZcKYhc/ZfUozYM:S+cff22qZhZcKYhc//

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88a6dc649e7fefc6235169d82384737674493bdaa06113c2340bb5067360c35.exe
    "C:\Users\Admin\AppData\Local\Temp\e88a6dc649e7fefc6235169d82384737674493bdaa06113c2340bb5067360c35.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    543b6e6b228a8311e7b692faedae36f7

    SHA1

    2f9c46f8a73705aad9b4d780d8512171cc8818a9

    SHA256

    620a63d6ce432fd24fc26ebff292bd24b0ea0e99b04d6f1f5d66befcf61d26b8

    SHA512

    2d75e7ac02f0594e11da5bfea96afdcdb8a44d355eb7bfdfc82f1afcefe7f2dd6678f912dc0a9018cf2b5ce92ccceca91a3debe44997b74be2f2b010f0023aef

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    309d5ba37e1848dc81f639c80d894461

    SHA1

    66a611b8bcef7c2aa130d6bca97fc7523980074e

    SHA256

    8156ad4c94c3295de42fdd8d2ebc95015c302392f2ab38930960c4382a77ddd2

    SHA512

    968cc61bc2ded885f7d1dd7be09892a3fa72ab88ada9b89ecc2438427494a0f41d7452bee4a604cabfaecd74bc100734ae383a9fde50f19e2c9b6beca9e9d13f

  • C:\Program Files (x86)\Windows Defender\qetyhyg.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\qexyhuv.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\vojyqem.com

    Filesize

    1KB

    MD5

    6c21a259c7792e23d19d41d3be1843db

    SHA1

    6d07c05befc9961fe8994b8d53b9403a981bc5f8

    SHA256

    9169bce60becb3a12b07b6344ad743a0ce35573e3594f4aac45226f140154b4c

    SHA512

    1114c859eea4e77961d89148450950c0585791d62289cabd0fc9215bb86a52044214b9c78e4a27a8f64ff4d15d3732a541a43d4b110e7c304bcb9563ded510e3

  • C:\Windows\apppatch\svchost.exe

    Filesize

    201KB

    MD5

    7f08963300718f53b8b61b931d357d25

    SHA1

    3a1734abfbef5d8b116dea3f21ae15b68b2d87b7

    SHA256

    e9c8864a6c64c2cc418ca2e2f941619103bdba0605c55c4e9f224e27c60bbc86

    SHA512

    d116046bfd3a06fb162443c7ebb8f61b8bcc897c919b9fb8057e9902582853a2cb2e62049929c542254468b5ee40fcc88aed2053fdb0547a032c37b402e3740f

  • memory/760-1-0x0000000002260000-0x00000000022AF000-memory.dmp

    Filesize

    316KB

  • memory/760-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/760-14-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/760-13-0x0000000002260000-0x00000000022AF000-memory.dmp

    Filesize

    316KB

  • memory/760-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/760-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2696-59-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-52-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-19-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2696-20-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-24-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-22-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-29-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-34-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-79-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-78-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-77-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-75-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-74-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-73-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-72-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-71-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-69-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-68-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-67-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-66-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-64-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-62-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-61-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-60-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-58-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-17-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2696-57-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-56-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-55-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-54-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-53-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-18-0x0000000002A40000-0x0000000002AE4000-memory.dmp

    Filesize

    656KB

  • memory/2696-51-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-50-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-49-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-48-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-47-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-46-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-45-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-44-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-42-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-41-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-39-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-38-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-37-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-36-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-33-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-32-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-31-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-30-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-28-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-27-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-26-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-76-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-70-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-65-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-63-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-43-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-40-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-15-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2696-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2696-35-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB

  • memory/2696-25-0x0000000002BF0000-0x0000000002CA2000-memory.dmp

    Filesize

    712KB