Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 23:42

General

  • Target

    ccedcb0874cdfedc68b3f3c828d744c26d23926af45efeef73508b61d79064feN.exe

  • Size

    204KB

  • MD5

    81fec5c76ce8ef51be4f893b16907c80

  • SHA1

    792c2b37e7f9fd0902349759b747183a9e0e2ee0

  • SHA256

    ccedcb0874cdfedc68b3f3c828d744c26d23926af45efeef73508b61d79064fe

  • SHA512

    aac22ab33c00a2527721009456628edb9f53ef82f98a947710c68429b895ae3812d204fa50c9a99afe297a6519a5bab05914ee12869bca96e7c2cac3b23de655

  • SSDEEP

    3072:U5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:ULexkuRaX41xoyJV65gzyZko+uch

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccedcb0874cdfedc68b3f3c828d744c26d23926af45efeef73508b61d79064feN.exe
    "C:\Users\Admin\AppData\Local\Temp\ccedcb0874cdfedc68b3f3c828d744c26d23926af45efeef73508b61d79064feN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8C33.tmp

    Filesize

    1KB

    MD5

    94f960d203a1d7cf914e30ff6408f6c7

    SHA1

    2cb51698ab80d46c029d3d818d59b679dde52873

    SHA256

    c1f9f424af81a1a39e57eb45b1a590f17050049a4f7e79e9655465e22336ef33

    SHA512

    ba8269a1f3bd399f429369747f1877eec4c4e6215b57ccf8ab3cb7c224e02dfb55325e2f13f883f6872f07db4898c0069eea31010d32739156196bb71664feb3

  • C:\Windows\apppatch\svchost.exe

    Filesize

    204KB

    MD5

    a3b04e4bfdd6ac7dd25951238c3a0657

    SHA1

    5776403c224622761135c9009f3d345183364bf5

    SHA256

    80611942ce045689f5e4fad2b7c1f81c827f923159a05513542a5e2ecc245958

    SHA512

    eeb17eefd437eeb4f92433179e4aaf8ede8073f0f01d51412a6498526b3c6a32543865dd5b5b85b88a1a7a0190a2900bb4692be97bf3330fac42d70265fddbe6

  • memory/3140-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/3140-1-0x0000000000850000-0x00000000008A1000-memory.dmp

    Filesize

    324KB

  • memory/3140-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3140-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3140-14-0x0000000000850000-0x00000000008A1000-memory.dmp

    Filesize

    324KB

  • memory/3140-13-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4848-62-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-57-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4848-18-0x0000000002B40000-0x0000000002BE8000-memory.dmp

    Filesize

    672KB

  • memory/4848-19-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4848-20-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-22-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-24-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-37-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-40-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-79-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-78-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-77-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-76-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-75-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-74-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-72-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-71-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-70-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-69-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-68-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-67-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-66-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-65-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-64-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-63-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-12-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4848-61-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-60-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-59-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-58-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-16-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4848-56-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-55-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-54-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-53-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-50-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-51-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-49-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-48-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-47-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-46-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-45-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-44-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-43-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-42-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-41-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-39-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-38-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-36-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-34-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-33-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-32-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-30-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-29-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-28-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-27-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-26-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-73-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-52-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-35-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-31-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/4848-25-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB