Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 04:51

General

  • Target

    efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe

  • Size

    212KB

  • MD5

    351dfc379b03ed7ae674585207ea03b3

  • SHA1

    e61db16ac456791a3780255cd02532fff808f97f

  • SHA256

    efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af

  • SHA512

    ed773bf3b011a740cc7601de995c951e1874070149785aa377520d1cafe0f4c68d4fd666083a39edb100a252eea85183818cd434848b93b8500256b697f797fc

  • SSDEEP

    3072:lGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:lG/iVkO20SFgBhxtW9mG9+Umt3Ezjb

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe
    "C:\Users\Admin\AppData\Local\Temp\efc145a3de488a0ba777e4836238558127673e8a6757ad06c38d2deafa8aa5af.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V4KZV1MD\login[2].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\50A0.tmp

    Filesize

    1KB

    MD5

    b41621f1a3bc87ae22fda0051aa9d812

    SHA1

    873304639256e8f1e2281bc220fee7fd0ded7b9f

    SHA256

    246231ef116b636f926cda967d1841c62bfc3e8e915d8356d4ce01b6b4bbbfdb

    SHA512

    13f17a8b48063cc8787d1181169a4b7a165c6e7dfc276ff7fff2c7b5e1d95085e1b0cb96f611b73f17edba7dc147f24207696ca419cabe020d6cb4734b956607

  • C:\Users\Admin\AppData\Local\Temp\9853.tmp

    Filesize

    481B

    MD5

    8c27e3d4ce4b92780cd2f22758c934a0

    SHA1

    d14648ec68b0f71dd044f6e4ce45fe18ad977ef6

    SHA256

    029ec949d0dbb3ba0e59b2151326e02ec2503489b85e90fe258928e28b4ad9ba

    SHA512

    d03ad25e6c223dfbbeef7ca1e9ad83bd0d192f19ea0a717ac5b68c80a37d9abaaa57bf7ba75d9583f8963c8b0b750cdc8c4c09cc1a4673a2dc095065b0b49be6

  • C:\Users\Admin\AppData\Local\Temp\BDD6.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\BDD6.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\CC43.tmp

    Filesize

    61KB

    MD5

    47d5c5a372409efa8ce76b260b0ae0d0

    SHA1

    c210e7608f7e5da6298d07315019080604af97cc

    SHA256

    e27f0067f9f0661b039db71578f79b5541e1c62b038cb69d65c15758ea116942

    SHA512

    eca7a7e9e4adc737fc2ead115fcf36f4be071bc833d6668ac5d3638f05ef525036a24a7998ed787651c36504a4eb67d7351f4a6f2c7d306274d7d6a9ecd84176

  • C:\Users\Admin\AppData\Local\Temp\CCC5.tmp

    Filesize

    42KB

    MD5

    7a14070449a454e3466806af606a9e22

    SHA1

    59022c010cfdac1351ae64b1eb0615148e5579c9

    SHA256

    fcaa0ada4ca6dae53bb7b139f23c1839421ad8c84fd5f0b1b879f92c86c7c0af

    SHA512

    7a5b629cd11db5684476734f92ba29aae5a838c295671afcf5ff58c29fa234add0cb069dcf5f38e0b37c3e796b5b0de51500375af69d4ed34fcf459e842a6bcd

  • C:\Users\Admin\AppData\Local\Temp\CCC5.tmp

    Filesize

    42KB

    MD5

    415ef72e860ede8bed53f8ce52b7895a

    SHA1

    089faebe0887240f42d1da1d3ed0c98194e028cc

    SHA256

    585a71b1c96e47b28f449a594dc76d1e87ae9ba8f3c3901508e72eb8a5211c4c

    SHA512

    eb0c98f55cafdff0befa712a20ba3abb9c6a06722db96e2855cf14e23f49e15d8e81b73e7752861a60d06b2eb5a61468db2afa47aefc39b8124e2971e3b796b0

  • C:\Windows\apppatch\svchost.exe

    Filesize

    212KB

    MD5

    8a70be5aa0d2ef0c06a46670e46c50f0

    SHA1

    cd2f185c29e791ecb58f622ad0afa9638cdbc8f8

    SHA256

    3da610cba84f4b94c3332d21d8674e08a73f155b17c9b433f0b71321ec18c701

    SHA512

    10dc0a112b9297afd12463e20f5049fbad36a7ba0f29a7003d3d53f6ff4f553753019957868b66ca3c4bdb24f163193fc5585c320cbffb716578b99564949777

  • memory/968-1-0x0000000002360000-0x00000000023B1000-memory.dmp

    Filesize

    324KB

  • memory/968-13-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/968-14-0x0000000002360000-0x00000000023B1000-memory.dmp

    Filesize

    324KB

  • memory/968-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/968-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/968-0-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/3136-58-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-49-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-36-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-80-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-78-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-77-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-76-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-75-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-74-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-73-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-72-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-71-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-70-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-69-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-68-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-67-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-66-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-64-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-63-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-62-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-61-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-60-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-59-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-22-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-56-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-55-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-54-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-53-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-52-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-51-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-50-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-32-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-48-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-47-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-46-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-45-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-44-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-43-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-42-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-41-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-39-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-37-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-35-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-34-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-33-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-31-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-30-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-29-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-28-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-65-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-27-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-57-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-26-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-40-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-38-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-24-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-20-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB

  • memory/3136-19-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/3136-18-0x0000000002D50000-0x0000000002DF8000-memory.dmp

    Filesize

    672KB

  • memory/3136-17-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/3136-16-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/3136-12-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/3136-25-0x0000000002F40000-0x0000000002FF6000-memory.dmp

    Filesize

    728KB