Analysis

  • max time kernel
    108s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 08:42

General

  • Target

    2cfbc27380e5346e242e690ee879adf88884f28446684c0e5cc7bf2972bdda06.exe

  • Size

    375KB

  • MD5

    bf4d299f7eaf4526dcac67d0efe60bb8

  • SHA1

    2feccbadcab65c6cd5304f6cceef47af681940ce

  • SHA256

    2cfbc27380e5346e242e690ee879adf88884f28446684c0e5cc7bf2972bdda06

  • SHA512

    f0eafddd038d90ad8814f5fc83104da2c8f78f8100c0d44b30e5a1fd150a22db935cd9f1beebd97981cbcb4dfc2a4cbbc7628b2965011877aa217d8be508ab8a

  • SSDEEP

    6144:63EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiU:FmWhND9yJz+b1FcMLmp2ATTSsdU

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cfbc27380e5346e242e690ee879adf88884f28446684c0e5cc7bf2972bdda06.exe
    "C:\Users\Admin\AppData\Local\Temp\2cfbc27380e5346e242e690ee879adf88884f28446684c0e5cc7bf2972bdda06.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YY018DS9\login[3].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\C738.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\F381.tmp

    Filesize

    42KB

    MD5

    303527d052ddea307081fa61c339ecc9

    SHA1

    12b26341313b94233922a62b510a585d76e2aa65

    SHA256

    e06c2b98ed710ed839dd9e001fac53485cf51992e00444191ae0e830a5c0b1ab

    SHA512

    554f9e5623dcfad82d621c2e8adce1ce6a69ae2c1a6f32d798bad654286507b6b6e962c2cb96d0cf8205962e308c11190ecd520e24964f2cc90c34fe4ea5541a

  • C:\Users\Admin\AppData\Local\Temp\F381.tmp

    Filesize

    42KB

    MD5

    5719416ec2283838c467318cb81724a8

    SHA1

    bbb9899f0aba19cdf58379359656a7e2dc1886e7

    SHA256

    c29a028860251c1c326c4444560f7542e4790a632e53725dac161de0819122bb

    SHA512

    33c8a57a2f60be9b72b9497d01356c7ebd999410d5aa10346975e255e8b7622c70df93419404569b1f7db1805d1939c9287d10ab622717bdefb6caf94877b672

  • C:\Users\Admin\AppData\Local\Temp\F392.tmp

    Filesize

    24KB

    MD5

    b22fc14c9061688a902156024257913f

    SHA1

    d8935fa00b8d32b221d65e19d4e977fbf65801b7

    SHA256

    35882eb98b661a4c928479516bb6517901ee6872a342db93dfa21b93c65e7848

    SHA512

    32590b1608042592d2a1f7a2bd9e3d0a8bb32dd034bc877f73814c90bf49f3c7bdb66090d272fa33e6ee231d2fa034080f0b9a28d257b0000b757e13ee30e7c6

  • C:\Users\Admin\AppData\Local\Temp\F393.tmp

    Filesize

    61KB

    MD5

    416e94b39294c6b4c8fdacf3d2fc972f

    SHA1

    acedb3c0f1f8760073ca858b24f43415b8d8741e

    SHA256

    30e7caf6f17a1f11afa3a84f95448b96af468ba97f4488065033bfadacba1125

    SHA512

    6064a85c8269ada4631a71c0c2f81e73a4f11d7faceaf599da37a3f3f127ecab36a82955e52fa77466c1c6943f321ddfd76a8232a2d8c364d4af5e52eaae6183

  • C:\Windows\apppatch\svchost.exe

    Filesize

    375KB

    MD5

    068adf33333762b336cd64de858fece5

    SHA1

    2e1795a9bebb15cc01f88c6fcf3adf6b47006d26

    SHA256

    b22b318f21e2768b77647c9891097d00744669afeda784d8fef21eb5f5642698

    SHA512

    c43947a71e8cf2ed9e0fe79b7af6e301204c29ee8ed6f7cad23f73a7db0e1a768a0a8e6213d051269c7db44b8185056fcbba9b024d9cb892441a2f9b74d6e0d3

  • memory/2616-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-76-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-75-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-73-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-74-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/2616-13-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2616-9-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2616-309-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2616-310-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/4916-0-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/4916-12-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB