Analysis

  • max time kernel
    111s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 19:14

General

  • Target

    8ad57523fde2dd1e788f4b9770e3c7b178ff712d8857c58f0330d492632489eaN.exe

  • Size

    218KB

  • MD5

    ebf3b689f2a326714dab5757d1d0ea50

  • SHA1

    6697051f209cbe0c901a5e2b378412da7314a85b

  • SHA256

    8ad57523fde2dd1e788f4b9770e3c7b178ff712d8857c58f0330d492632489ea

  • SHA512

    a0262fc3c16d304c8c402b705b9aba20e5218b88715237e369eae8d2d784692a64b803eba68e219035f29ba11f7267b79ae67109983f689ca33e5a6caa4ce502

  • SSDEEP

    3072:tvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:h1SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad57523fde2dd1e788f4b9770e3c7b178ff712d8857c58f0330d492632489eaN.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad57523fde2dd1e788f4b9770e3c7b178ff712d8857c58f0330d492632489eaN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:244
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\225B.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\225B.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\4A7A.tmp

    Filesize

    42KB

    MD5

    3c71a2b58b525b169b8e06d1d7406131

    SHA1

    a68cca15638c98b5d4f8ec2690002b0c63bfc901

    SHA256

    9733535c30f44ce9b233b9edcf7294049521d9f0dad6ec20a298629da9df7b90

    SHA512

    1932300e7a04dbbbeab45bf7f9169bb1b35fdd291c2546d726fa103a3e50681138882b755796bdab9c5ae8ef6eef8dd9fddbe29a6ac7912e9e1585ff921ea615

  • C:\Users\Admin\AppData\Local\Temp\4A7A.tmp

    Filesize

    42KB

    MD5

    03d2331aea95755aef8a95706ccca35a

    SHA1

    45c976fe8100d3e9fcb9dc4c7c9f92a5b6014118

    SHA256

    029e42a8b472e0174a0e939ab5fd7d548c644f5d258930b7aa8ad7f108c0320a

    SHA512

    7923c9a37cfcb02fb08fc789ec654568e29e635c2a2f8b821296a177503beee16675205033f95fa3684395528b24a9a38edd530cb72cc94f14d949b8cc780ae9

  • C:\Users\Admin\AppData\Local\Temp\AD77.tmp

    Filesize

    1KB

    MD5

    e797ebb302a63ec2cef796175276d930

    SHA1

    c068e1e7b71dfa4634784d3256cc2c1ffef46c1a

    SHA256

    5197fad3eb49cd5b6c67e59be5228b7b82bf091229a5cf87f852f69ad0ba5520

    SHA512

    57edcd29d55f9394266d7d686f98d6af503596b2df10940d39977626eb5eac7cdb0535d6f110b4b7563ab4cf0aeda54fd4e5b387a8a12d392e3d32ec6ab53536

  • C:\Users\Admin\AppData\Local\Temp\AE3B.tmp

    Filesize

    481B

    MD5

    a80ea62cb9a5e564e96d92232df6d106

    SHA1

    7c98b8a340c73f87f7e038a44ed5699f7d81de85

    SHA256

    e0bf65ebdb0ce21546a1ad6682c2bad578081de54ca7e1ccf9ae8bf9a71bda56

    SHA512

    ad1dcac35dbce52e1284e8b09abe10228191a876ebef358ac8f7c8f7582f60cadfe54e6f12e067d1e87d8659da1e2c285095d980c47a484ad1bbf50d3b8fb1d6

  • C:\Users\Admin\AppData\Local\Temp\AE3C.tmp

    Filesize

    61KB

    MD5

    c17bca2712ddf8000fe6f766f127e39c

    SHA1

    560380de7cedad23319f34661dbd2c29511b2afd

    SHA256

    deddfd9d84170f543146578fd31ddfc2a11b2c90b0e1fbe1e9d212065159426a

    SHA512

    abf555f43403280bf3e0cdb397fd5e32e279d8b3ea86498a1400ac68f117764e1effd77d4804fa811cca7bc0d796abae589c384e1c5a69f890013ec3b0b4738e

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    4e45e51dd2d399d2d3e384abf3fc57ce

    SHA1

    cc3ed5f7d39b346d8331f0ab1156dce32458f483

    SHA256

    917b489195eb8ce9b48233fd03b9d51e541eebe4632e58e1cf36db6fc11dd80e

    SHA512

    907ec1984d34c08a651578518040aa6efb9301e209c0bba723077a3fc639c0c99f89efd657c4185ad2f43fb4443aeeeaf8d42a0b81657964c44ee5d9156e4125

  • memory/244-12-0x0000000000680000-0x00000000006D1000-memory.dmp

    Filesize

    324KB

  • memory/244-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/244-11-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/244-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/244-0-0x0000000000680000-0x00000000006D1000-memory.dmp

    Filesize

    324KB

  • memory/3152-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3152-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/3152-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3152-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3152-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3152-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB