Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2024, 05:34

General

  • Target

    fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe

  • Size

    686KB

  • MD5

    32b604b8fd06e37c36388ab5cb01f04d

  • SHA1

    f1b0a44482c17330efa6f3ba72c1fcc32dc8a778

  • SHA256

    fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a

  • SHA512

    768a4247a2470dc6c9246b3d588596b52343f03ba17b8d86afe289de023eaf02a21a11eea7474e35a7c971a0c42d8cc9bcc1287afbbd952a91c329ca33043d02

  • SSDEEP

    12288:gmWhND9yJz+b1FcMLmp2ATTSsdApVHyGbs2CYPHrLpVmCbHDSgp:gmUNJyJqb1FcMap2ATT5itjCYZ3DSo

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe
    "C:\Users\Admin\AppData\Local\Temp\fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1CD8.tmp

    Filesize

    24KB

    MD5

    639f2534ba6b503fc3929027f47e00d6

    SHA1

    18544f2152f30e2fc4ac599553f0f125caf2875b

    SHA256

    8ced3a7d583c7bcc2068e67196559b160be34e276c4e8e5693385b1e54b80ef1

    SHA512

    d2c6e93370150b814e8b8808c235da7bdef9a82a80c1348a8ae8516352ddea207eb843dc9c646a19eb466606a0875e1aab7f61c6e7de9e0cc840014773555414

  • C:\Users\Admin\AppData\Local\Temp\6F90.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\80D1.tmp

    Filesize

    61KB

    MD5

    89bd69fe3fc451f628dd95ef70bd57be

    SHA1

    f8c646590717924bfe81cc30646d6212e5aba2d4

    SHA256

    e45f87784c8d5ef601ec853f322491a72ecc9db2cf9fca5900bd4c123d482ddb

    SHA512

    8e3069cf662f08a4013f89de08e99efa6ee29f2dd362666ad963c9eb5d5e597ab34a2957ae3c7db88458a05f85a49605ee7629b3398dae1feba199fe58a29e83

  • C:\Users\Admin\AppData\Local\Temp\80D3.tmp

    Filesize

    42KB

    MD5

    c06062605089622baec2f799c0ea1885

    SHA1

    4582c047165069d5f384fd324f3e1ac807831047

    SHA256

    90b98a40456355c3e44ae3fe2bd4fca625b98791b5a7a4d7d2af4a5f1d155264

    SHA512

    98206e58d8f4efb5e38a84a7f06b55755e2e70d369c5d9e33d2bc440255d81fd63da0b73c62b5f9ea3a54b6f9fa7b475aaf2f6fbc1f8d23129e5e680b4950164

  • C:\Users\Admin\AppData\Local\Temp\80D3.tmp

    Filesize

    42KB

    MD5

    b0b6fd63b23bf4c95a4f3285e9989067

    SHA1

    ca57b97b6d3b37f97c6e18e2ad666598b0db2268

    SHA256

    9a3ad53b561da87d4a1bbe1004c209c5290a59ee17f1844fafdbad1923ccd559

    SHA512

    8c5a0ee41ba47217f5d8afa6384b5e739f087f2f44670a69000af6affb79ebe049a59286ef36884755d42049e70df9933d304f4cf75b5bd4a8a5782309839c05

  • C:\Windows\apppatch\svchost.exe

    Filesize

    686KB

    MD5

    2df46a795fa9bd34eb5f8b49538ee11d

    SHA1

    2cfcdefbe37322d57092f460e41c9fc70bfafe53

    SHA256

    4dfdc129bef89bc3b6f4140f451019f927b47ae250f6571dd3c4e766a29781de

    SHA512

    f3fd3fa28348274193882c13734c215a91813e5bb4edaad84bb52b2cbfc1d58f961d595d0ae5bb0d9d4e9338fb528d694c8212b0b46b7528067677685b42af52

  • memory/4452-49-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-42-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-13-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-11-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-31-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-29-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-73-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-72-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-71-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-70-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-69-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-68-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-67-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-66-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-65-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-43-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-63-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-62-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-61-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-60-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-59-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-58-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-56-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-55-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-54-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-53-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-51-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-50-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-10-0x0000000002A00000-0x0000000002AA8000-memory.dmp

    Filesize

    672KB

  • memory/4452-48-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-15-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-47-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-64-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-44-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-45-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-41-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-40-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-38-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-37-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-33-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-32-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-30-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-28-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-27-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-26-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-24-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-23-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-22-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-21-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-20-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-18-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-57-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-52-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-46-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-39-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-36-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-35-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-34-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-25-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-19-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-17-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-16-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4452-175-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB