Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 04:33

General

  • Target

    94eb6c1d831c6565287199f682aecd23c7c825967980f9ad2f7887ee0918268e.exe

  • Size

    204KB

  • MD5

    bad4473365779bd6890804702f409c1b

  • SHA1

    8efd6ac651985e9e6845aff32fe34de59f3cfd45

  • SHA256

    94eb6c1d831c6565287199f682aecd23c7c825967980f9ad2f7887ee0918268e

  • SHA512

    3f97f62a9d396c93ff7f41ae8685d6f2dca8a95ca94866306e729d0da765ea7ec08fe72dcc1a1f0259c0960d86f277450f06e71924b925b182d25e5766a1ba54

  • SSDEEP

    3072:a5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:aLexkuRaX41xoyJV65gzyZko+ucR

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94eb6c1d831c6565287199f682aecd23c7c825967980f9ad2f7887ee0918268e.exe
    "C:\Users\Admin\AppData\Local\Temp\94eb6c1d831c6565287199f682aecd23c7c825967980f9ad2f7887ee0918268e.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\9687.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\9687.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\A429.tmp

    Filesize

    61KB

    MD5

    bd66be618b238edfb511323e62c1331f

    SHA1

    01a3b9c1235276bcd2d064caa1cff95e80a1fea2

    SHA256

    756e99f7033b861999523593242c434f72ef82c7f8d2e4509cb03cd18b0a9bff

    SHA512

    ed2959c5a1c204283b6e7718dda4d39d0b3acf708608f84cf3bc8eb5f7d3b611975a3ccb336a6da52398346377a8ee9a978f765a1e3e8e8f83dc1253202de86a

  • C:\Users\Admin\AppData\Local\Temp\BFC7.tmp

    Filesize

    42KB

    MD5

    6da2bd172d7f7e624017c0aedbbcca73

    SHA1

    52b2786bd7f6a77ff14304229073bce3bc7df6fa

    SHA256

    d405675e70c7835001da083e9d21e5bc9f907c7591c27b4c3c8041c8674d474a

    SHA512

    0112eaf8388734ae8d47448ae0bbb034c031ba428cf8a8402d0eff37a6af301c70d0cde639387ec2063bfc8f893119c2c02d45049b97b69db30abcb4d6fad9f3

  • C:\Users\Admin\AppData\Local\Temp\C04A.tmp

    Filesize

    61KB

    MD5

    f6080d293a648ad4da09d9128adeb43f

    SHA1

    9eb59a18a3b856a7ddbdc7f5c3e968fdd7fb5a3b

    SHA256

    f51257e3bf851d0a7fb7cdedafc53b42ff71a01d33347230348cf96aeb33ac15

    SHA512

    59e8112a30ecf0fd52f3f24c4d32ba26e17339911d64da6df90d973b6e25d167bdf916ce164bf08c9afd025364bf193c7f441824fc40593512d4c5b957b6b222

  • C:\Windows\apppatch\svchost.exe

    Filesize

    204KB

    MD5

    00f526716d07791e34dede1e1ab2d1d6

    SHA1

    d8614f9b54b35b3977601e02102c919149c139d2

    SHA256

    9c2e82baa56b8db654594e97552fa2d3930ca4eb59de364a36fa3a0259672d52

    SHA512

    e4710175ad09bb88f8e26311505721ae4bad0a104398d2b24279e232971700292c4cc177212913b6cb22f849646df49b7747bcfeb681a1340d8afbd376b1d1c2

  • memory/1044-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1044-15-0x00000000022D0000-0x0000000002321000-memory.dmp

    Filesize

    324KB

  • memory/1044-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1044-14-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1044-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1044-1-0x00000000022D0000-0x0000000002321000-memory.dmp

    Filesize

    324KB

  • memory/4036-67-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-60-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-24-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-22-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-25-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-28-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-27-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-26-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-78-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-65-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-55-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-40-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-39-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-29-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-79-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-77-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-76-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-75-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-74-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-73-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-72-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-71-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-70-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-69-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-68-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-19-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4036-66-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-64-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-63-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-62-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-61-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-20-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-59-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-58-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-57-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-56-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-54-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-53-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-52-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-51-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-50-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-49-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-48-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-47-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-46-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-45-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-44-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-43-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-42-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-41-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-38-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-37-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-36-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-35-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-34-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-33-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-32-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-18-0x0000000002B40000-0x0000000002BE8000-memory.dmp

    Filesize

    672KB

  • memory/4036-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4036-13-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4036-12-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4036-31-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4036-30-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB