Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 04:08

General

  • Target

    d231a385059afa6806713b75e56492a4f2c93bf9fc7c8ac67fad4d7304311de1.exe

  • Size

    218KB

  • MD5

    55ea8c0f6d3622494b44b4335d31b145

  • SHA1

    2633d874518085928c761c6aacf4718e3349caa4

  • SHA256

    d231a385059afa6806713b75e56492a4f2c93bf9fc7c8ac67fad4d7304311de1

  • SHA512

    db6cafdc1a5a1033e214da9fad2d8e3efbfe78c6029462fcf63ad3e5e0f381be3e65d2b59438d85ab1bf0eec56302aa46a0ec0c8fe38f239209df30798a239f8

  • SSDEEP

    6144:yEQBDdO1z7L/EIhZDE9oLfFWlMZT7+DGaMwIC:yEGDdQNHEwWlMxYG/wI

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d231a385059afa6806713b75e56492a4f2c93bf9fc7c8ac67fad4d7304311de1.exe
    "C:\Users\Admin\AppData\Local\Temp\d231a385059afa6806713b75e56492a4f2c93bf9fc7c8ac67fad4d7304311de1.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\108F.tmp

    Filesize

    61KB

    MD5

    8f763e3ede3b30dc6cb6eeb210a2b132

    SHA1

    12ce23a0d29ad73f3cf15eb6648612c448f922a8

    SHA256

    b0fd740dbacb5aea04e24e20c752d3c64e8198a7f015483d25a97901f05c04eb

    SHA512

    9afc74f99ad2fc258eb723317a23ca56432664e8e564e2ce53d8add479e2e64b733521ba052c8124555a34ecdff4a75e5a3710e463a216486b5272899ad45acf

  • C:\Users\Admin\AppData\Local\Temp\1122.tmp

    Filesize

    41KB

    MD5

    7499aa541c2fdab6db4dd5dff82daaa1

    SHA1

    066dc640040450350411224774b998d2aad1bdea

    SHA256

    5a02d9d24e1a6f63629b1e87b97d8a96c38211bcd3e8945154801e7057e9a779

    SHA512

    faf94d8fda8cbea2f44e9eb85574f8a07827b8185318eeebddb9d10c7cff54f1b6887a8667081c70514621673f96f1949ac692a15dbe85a0d8b4c7ccbf7bb89d

  • C:\Users\Admin\AppData\Local\Temp\1122.tmp

    Filesize

    41KB

    MD5

    0c3d2cbc43bc52c94b578da518824aad

    SHA1

    c09c5f07dce3ce808943572ffc98e63f1effa88d

    SHA256

    f04de14c24d1575f194ba169633d3b1c477e063a3db9176bca48511a282af7aa

    SHA512

    3f96b74b5208c30fdd6b6aedc4710a9360040a5bf081404a1fc3ed4769ef586d47329a7714c57d6951c5fafa8ee594e0e034a7d294533d4270177e13caf92d14

  • C:\Users\Admin\AppData\Local\Temp\AD75.tmp

    Filesize

    24KB

    MD5

    deaf26f92a6a4d291e7475fb8d1db157

    SHA1

    09b987c8d9ca6ca5412f53566061405629769ea5

    SHA256

    52b4b64b5d20b635d554aba0a1a961255a79cdf26f0fa2be99d641fedede563d

    SHA512

    8a5839efa93d83cac52ca7c8d39bcffef19d4ce825ff0228453eac8491b959cb50adcb1ebf01475d7b01abbba921b3ef26210338191c76941c9cd36ba8b236d4

  • C:\Users\Admin\AppData\Local\Temp\C3ED.tmp

    Filesize

    1KB

    MD5

    3122a95390ca6fe02b1c212e7b398c8c

    SHA1

    fef1ab31270b1fb1e017ab464e546611150de036

    SHA256

    51b08b8e48029a7483c8a0ce3c3bf169f0f24178dac6a08ebba7fb2ab111a7af

    SHA512

    f2aa6ccd455aa88bdb7f6b4c58bc5b05ed01d925515aef4d9a902b71802a65ab837e24017d487aca8bfd0123c8ce9237e1a4e4f5a5fdd8507137a2b8a8704c8f

  • C:\Users\Admin\AppData\Local\Temp\C41F.tmp

    Filesize

    24KB

    MD5

    2f4ba57958fe2f3b79f4c0cf86bca3d4

    SHA1

    6ca3cdf654362662e3a780c985c615124918f47d

    SHA256

    f3b1745fd2552d3c29204de116a2ee1b6a4cc112561f74a4da3597fc77c0ce6a

    SHA512

    62d8776ca2811c702b8def9cf492bd4ec79242c6b8b1f40cdba0e6ca179bcfa31be9aba4990a2a9d7cc86e1a287170a9260cd912e3cc5a4a5ca2e94351dd512e

  • C:\Users\Admin\AppData\Local\Temp\FF52.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\FF52.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    3cfa32e393cb5f6ce28b671e1a7fee72

    SHA1

    f6260bb1e932e6769427729b82d72ce6100e74a8

    SHA256

    3d4c867c49ed6d293eceea738f29e938a4fec676c6d418affe14e47b1683b57d

    SHA512

    f9892a3dbc95084585a3def4b233dd0a985c6d8337bffd407dac4597b52e8d05cf1f21e2fbc7ff0852178f2270183e3b8dce0ad780d6683ac41d7e54e2a41667

  • memory/4244-53-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-43-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-24-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-46-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-48-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-79-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-78-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-77-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-75-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-74-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-73-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-72-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-71-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-70-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-69-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-68-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-67-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-66-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-65-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-64-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-62-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-61-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-59-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-58-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-57-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-56-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-55-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-54-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-20-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-52-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-51-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-50-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-49-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-47-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-45-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-22-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-44-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-42-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-41-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-40-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-39-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-38-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-37-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-36-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-35-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-34-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-33-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-31-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-30-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-29-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-28-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-26-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-76-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-63-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-60-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-32-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-27-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-25-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/4244-19-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4244-15-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4244-16-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4244-17-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4244-18-0x0000000002C00000-0x0000000002CA8000-memory.dmp

    Filesize

    672KB

  • memory/4716-0-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4716-1-0x0000000002420000-0x0000000002471000-memory.dmp

    Filesize

    324KB

  • memory/4716-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4716-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4716-13-0x0000000002420000-0x0000000002471000-memory.dmp

    Filesize

    324KB

  • memory/4716-11-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB