Analysis

  • max time kernel
    116s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 07:42

General

  • Target

    2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe

  • Size

    218KB

  • MD5

    8b6d3276623e6bacb5866b8a9a3a184c

  • SHA1

    09d5f71f0e39638ced6ee6ce1c9bb054d1194ac5

  • SHA256

    2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365

  • SHA512

    bff04a671882846f19cb5edad75e200b006cf2026ea335f69930f221757c0dfef916783a6f7b710ee0a4ad0ffb6fdeefa71f47ca80c0c8b80943f26e34bd5254

  • SSDEEP

    3072:bvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2Hu:j1SyAJp6rjn1gOObn4b6h9L

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe
    "C:\Users\Admin\AppData\Local\Temp\2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4052.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\8408.tmp

    Filesize

    61KB

    MD5

    d378a43f447db3c8fea7f3a75b626e12

    SHA1

    e269a33e4a686e77c945e4b863372ffe597379e0

    SHA256

    f52169a588cb86f8440f97162d73113ab5d4a3d26ca2b9b2ec07c4a500ac2c16

    SHA512

    404f2e8a817c2fedf947f66bc534dd29aa85c54991bd5db4e7513c8ebc5ac55c30dd21f02498b98c4aecf6ebd82dec5c0bcc1b688569d04e463c1e41fa20bec2

  • C:\Users\Admin\AppData\Local\Temp\CC0D.tmp

    Filesize

    24KB

    MD5

    352e0a6a925e2f7d68eddba760d8ffcd

    SHA1

    1130d2d394a36a05b5a2682cd43f79e1e739d114

    SHA256

    7a1de84667b028516483bcbe9354770ee5df4a9cef2e54c3fa1a0626c00c717a

    SHA512

    f8b8f99516403a9d1582e31b9a743fe2455f80f32e1cb300bbdcea0dce642acad312c6c679e1f90b1bedc8e5b35dc9a39f2c25222ef5335300e848cd59b83725

  • C:\Users\Admin\AppData\Local\Temp\CD7C.tmp

    Filesize

    41KB

    MD5

    26003fa1b48b2a715a4c229fe5990d47

    SHA1

    e2a4965a0e815dcc5190e3907859061ca2559a27

    SHA256

    50ff601116fd0d15e54e6b48c68368994dfa9608d4bf99896194e9a8fac256f0

    SHA512

    8ef8924929df08cab2d8edeb47644082632e4d122f655d8fbc1402a903220a85ce3f29f0951a9df3442a6a9b495b0b9c9fd57f15acb1f6fc2d746c6c660abe3e

  • C:\Users\Admin\AppData\Local\Temp\CD9C.tmp

    Filesize

    481B

    MD5

    ec1a558cba719c4abf4f652cf0371c0a

    SHA1

    2252255d8de4d1dbcb1645b0fe21236cdc666867

    SHA256

    56b3e8e039929d5960dcfc9adec928c51d636063aa686ba8905da3271b20e4b3

    SHA512

    39499836e5923df1e5e8d5a02b2fefdecb75dffe8f1dfdfe3d0d15a6a23f8cca78a4441e798b57f3257d3b5fe09d0e980fa3e3299c8c72b6b7a321436ecabcb5

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    bd6c2ed399191341dd67561da6e304cf

    SHA1

    acc2db2ac6779509fcc3a3f228ed380c4988576a

    SHA256

    af8ff1e0a90ca3f114176454b60efc33813a1ec7dd925f8d41efa48ca0ad9cf3

    SHA512

    0b42f02674cb4e0d9ff53ab2356a1e54f6dc797d80cc733abb007ebe5225b8a7da2d9e4533c199f08c6db85876a15390f969e0f6cc2d04eb86e41036d85ccaaf

  • memory/3604-0-0x0000000000880000-0x00000000008D1000-memory.dmp

    Filesize

    324KB

  • memory/3604-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3604-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3604-12-0x0000000000880000-0x00000000008D1000-memory.dmp

    Filesize

    324KB

  • memory/3604-11-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/5060-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/5060-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/5060-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/5060-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/5060-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/5060-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB