Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2024, 21:31

General

  • Target

    f41692c7b8883f39dd00091db351ed19d69f6c8b788f89499dfc45a9f251513e.exe

  • Size

    201KB

  • MD5

    45da3d09c1f5bb878975d5941fd86648

  • SHA1

    5e3b5b2cd24f323ddb173ef56ae04e71dfc88bdf

  • SHA256

    f41692c7b8883f39dd00091db351ed19d69f6c8b788f89499dfc45a9f251513e

  • SHA512

    38ee1ef10e86162b2d74f669fb10a984528cb5aa8e71c5fa6319807bf98511b40e53cffd718032a81d88ff6db202660dde0a9b3491cb8f6d076e3114d157359e

  • SSDEEP

    6144:4t++Jbojf5Vq5OC4qZhZcKYhc/ZfUozYM:7+cff22qZhZcKYhc/3

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f41692c7b8883f39dd00091db351ed19d69f6c8b788f89499dfc45a9f251513e.exe
    "C:\Users\Admin\AppData\Local\Temp\f41692c7b8883f39dd00091db351ed19d69f6c8b788f89499dfc45a9f251513e.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:60

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    63ddacf89c6faf8b215b2fe8fca618ae

    SHA1

    da288585f98bb49fd94f53d59815e8686f575e25

    SHA256

    d002158f6e737f101abb4dba0115583c00252a09d405c7d5f16e67758a78269b

    SHA512

    2f2c5f0a817c790eab841ccac99684d35d1065d95b0fe1717e3190d609aa4fedd9ed9b7c1a123a5fae2009f9de1015bacd14aa7a24155a1c079962e5229f8c8f

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    f7ab5a857eef903a48335059cde42730

    SHA1

    78c0fc5efa1341df09849456d1a6e85bd26c781f

    SHA256

    1a51471b266433a5e4de27d9c1a767cb55eb6a932d2156635729f67a6afe7521

    SHA512

    5e67763fdc95bc56b0d2ae1d7656e68cfc5c8f84015ccbe7f0fb0105f98b7e75fc16b2d088208ee30aa9ce22b93a2ff04a750ea690e7709e9ef326e1c9e8891f

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\puzylyp.com

    Filesize

    61KB

    MD5

    b3e6c8b2ec57cc19b0c837739b7721c4

    SHA1

    3f4d1fa54ddf4100347a6ca016c600b7bb4276ee

    SHA256

    dcff0ccf6292717f9df85a889306a59e76674146b2351f4ff1fefdd718615162

    SHA512

    b66945275c524bc24a6073e151676c4a9599e9ef7b6baea761a280abfe179477e50e1becee708dc3dd7164979803e44cd98f3b18db5954e1f99b749e02ade253

  • C:\Program Files (x86)\Windows Defender\qetyhyg.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\vojyqem.com

    Filesize

    1KB

    MD5

    fb6babf8c24d7102d911bd9b0b5e2c58

    SHA1

    9878636219c1837b9694e6a9bafd8c67dd7eb039

    SHA256

    a57d386a2350f81c561c7df89773633155bf65378fd09e0200ce3ab8a2a354a8

    SHA512

    3afa91434e08fe1d110eca675ce54743b87250c85afdbff88e00e07ed15235c6a24eae56148c34d0c696636f469a794a73f50c13f90d1c06b68b727457267ddf

  • C:\Program Files (x86)\Windows Defender\vojyqem.com

    Filesize

    1KB

    MD5

    50052b2cb8f40315cba0c0e7c4ddc305

    SHA1

    e550b90c0dc9191d21ecabda9f8a02c226f32455

    SHA256

    cc672ee9459117fa365de8d64179a76724f37e898c62d356c5a72153bd9e5c95

    SHA512

    357e70a440b89e92fac5a94760ee0a23f5dc170e8bbe7ff65a4ab51529c6005ef4ccaf2f559695e0c56462fe84fd4f8bcd45b6673915191194c6218161f718d7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\login[3].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\login[4].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Windows\apppatch\svchost.exe

    Filesize

    201KB

    MD5

    8acfeaa163d99e145ffb8d90e495b356

    SHA1

    aed6162b488d1056819943144c8698486be0019d

    SHA256

    a72f77262738de90fb79c96651473f45dece00a05aed86f1bef709bd5e6ea75e

    SHA512

    90fe6a810415d3828a29e1c93a11451abdbbc627e5bb08ba105afa5a65293a4ec0c440d63606117a0be9fc27f8d639ca77b876933a7924068309117e4a454b9a

  • memory/60-49-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-41-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-79-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-76-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-75-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-74-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-73-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-72-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-71-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-70-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-69-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-68-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-67-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-66-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-65-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-64-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-62-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-61-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-59-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-58-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-57-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-56-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-55-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-54-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-53-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-52-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-51-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-50-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-77-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-48-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-47-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-46-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-45-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-44-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-43-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-78-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-40-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-39-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-38-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-37-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-36-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-35-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-34-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-32-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-31-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-30-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-29-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-28-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-27-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-26-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-63-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-60-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-42-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-33-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-25-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-22-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-24-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-20-0x0000000002BD0000-0x0000000002C82000-memory.dmp

    Filesize

    712KB

  • memory/60-19-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/60-16-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/60-13-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/60-17-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/60-18-0x00000000029E0000-0x0000000002A84000-memory.dmp

    Filesize

    656KB

  • memory/2588-0-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2588-1-0x0000000000650000-0x000000000069F000-memory.dmp

    Filesize

    316KB

  • memory/2588-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2588-12-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/2588-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2588-14-0x0000000000650000-0x000000000069F000-memory.dmp

    Filesize

    316KB