Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 20:21

General

  • Target

    0c595ae8175b3eca651908cfdcaab87af3521bf1952e9ac90978b99cd1dd80b3.exe

  • Size

    205KB

  • MD5

    c902ca868a0647a4741a8f55ce4c0564

  • SHA1

    a1ecce9cff93c010c3bed122eaedfe1073fd6691

  • SHA256

    0c595ae8175b3eca651908cfdcaab87af3521bf1952e9ac90978b99cd1dd80b3

  • SHA512

    0b000bb31e78c0915e0955dcfbbf4d0994a00016555f19c4c5201d7d62eaec8e3660a9df22e54819ffc66b63f0c96a1c00bdc32b28bad35b571b4d2e4b38244d

  • SSDEEP

    3072:s7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKC:CzHnMLm5GNGxHUhtnkdpHqTKzhh8y

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c595ae8175b3eca651908cfdcaab87af3521bf1952e9ac90978b99cd1dd80b3.exe
    "C:\Users\Admin\AppData\Local\Temp\0c595ae8175b3eca651908cfdcaab87af3521bf1952e9ac90978b99cd1dd80b3.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 6084
        3⤵
        • Program crash
        PID:4692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4164 -ip 4164
    1⤵
      PID:4564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Windows Defender\gahyqah.com

      Filesize

      24KB

      MD5

      8d47f3ee9236e8a0d6e91834748e5201

      SHA1

      1ab7f37396351b0ec622596872879227f54f7c79

      SHA256

      a2ae31c0e98f3398b5904397cd423eca31fdd6e1e96766152269711b574bad2e

      SHA512

      459d80266214ddb4eb56fca20a0337b5bd11a383374a39370b2be765a04c9534d8754223083df7ce80b2e605e5c540d05502925b949650e26bf055eaeef9b38e

    • C:\Program Files (x86)\Windows Defender\galyqaz.com

      Filesize

      42KB

      MD5

      dc716c45423231d81f4399d9e1960397

      SHA1

      7fae801a47b341c137a202be0677d941fd0c3730

      SHA256

      70d5ea9219470026241b7255a7cc52b8f1c581024953baf350bfe4833fb79955

      SHA512

      2519e3937e3f5392db8cdbf1e9176185744a2034c09fa59e41e155f0a9c2eb5e40e9271262cfe2feaba6ffe86463124fd76c6e3564bd64b866a9cbc8e123e0c7

    • C:\Program Files (x86)\Windows Defender\puzylyp.com

      Filesize

      61KB

      MD5

      56bb16fe6550890b0d18a7640745bd1e

      SHA1

      2e91708623d5ef3688a90de0a5cb5964de38a211

      SHA256

      77b515066548be87dd3e3160bbf2cfbe64f53c8e47313e8d41f1c8adec3fd942

      SHA512

      48f16899a57aaa3a73801ce4ae4e7f2041a13fa351de18aef67e15f0f2e7b007dbc9dec01898881fe730fc1437c324a7566e72c28bcbf509d321418b31741a15

    • C:\Program Files (x86)\Windows Defender\qetyhyg.com

      Filesize

      593B

      MD5

      926512864979bc27cf187f1de3f57aff

      SHA1

      acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

      SHA256

      b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

      SHA512

      f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

    • C:\Program Files (x86)\Windows Defender\qexyhuv.com

      Filesize

      114B

      MD5

      bfde1e9e9c32c1681a16139450c6909d

      SHA1

      7e669b927e6a75a10a0ca29e38e58ddcb49b725e

      SHA256

      e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

      SHA512

      781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

    • C:\Program Files (x86)\Windows Defender\vojyqem.com

      Filesize

      1KB

      MD5

      496800c438316d0f6bb67b5e6bf8d474

      SHA1

      c096c110bd39df03fba66cf480c92420b3231e52

      SHA256

      1bb443c84d7c5c64f209fa75f4d21fec8d75d6b7729e355a361ed4af69cc4a21

      SHA512

      e81542c61dcc6acaca20f3a9382dab8d4315fe772a4f1e3fe36be24fa4b1c6bfa3dcf37df8fec775d8f92732879115ccfe978878454a22ba74c1641bd472a20d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G94T3PNL\login[3].htm

      Filesize

      168B

      MD5

      d57e3a550060f85d44a175139ea23021

      SHA1

      2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

      SHA256

      43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

      SHA512

      0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

    • C:\Windows\apppatch\svchost.exe

      Filesize

      205KB

      MD5

      86b5c6094a9c966bcb21418ba553c1e5

      SHA1

      842b4dcab8d4595c2488ca6d37fc9d416f82d9bb

      SHA256

      70101df42b235fd74bca4965c6464d05f7dba22cb0c4d1b55e903c39d03d3a10

      SHA512

      d4653f2b6e909e8208b8f1aee4a10116b9df2a58a2bb40208219c9dd6049f96262503d9c3d7e47a3df1ef035b4f6630249440df2d070743389c3384f203d2b78

    • memory/3944-0-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/3944-13-0x0000000002220000-0x000000000226F000-memory.dmp

      Filesize

      316KB

    • memory/3944-14-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/3944-11-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/3944-2-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/3944-1-0x0000000002220000-0x000000000226F000-memory.dmp

      Filesize

      316KB

    • memory/4164-57-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-48-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-61-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-68-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-79-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-78-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-77-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-75-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-74-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-73-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-72-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-71-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-70-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-69-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-67-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-66-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-65-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-64-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-63-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-62-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-58-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-60-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-59-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-24-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-56-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-54-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-53-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-52-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-51-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-50-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-49-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-23-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-46-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-44-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-43-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-42-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-41-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-40-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-39-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-38-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-37-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-36-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-34-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-33-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-31-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-30-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-29-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-28-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-76-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-55-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-47-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-45-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-35-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-32-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-27-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-26-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-25-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-20-0x0000000002C40000-0x0000000002CF2000-memory.dmp

      Filesize

      712KB

    • memory/4164-19-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4164-18-0x0000000002A90000-0x0000000002B34000-memory.dmp

      Filesize

      656KB

    • memory/4164-17-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4164-16-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4164-15-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB