Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 02:19

General

  • Target

    beab8cc8a0b9919c845469469cc8c352d06ed8f064ae9dc5ff5ebdc63c8d57b4.exe

  • Size

    218KB

  • MD5

    61bd04cfda0d67452883374b7c5f6913

  • SHA1

    f96357b79257e24276a05f56efd6c11511443552

  • SHA256

    beab8cc8a0b9919c845469469cc8c352d06ed8f064ae9dc5ff5ebdc63c8d57b4

  • SHA512

    94d464d8cd64ae94112d12ce09a844d792964f647d0f3749a4cd551914efd30c4331f8d4fbd2c9c3f0b78ca15f6cc03bb7f1105a5c9436e6467e291d28427075

  • SSDEEP

    3072:Hvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:P1SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beab8cc8a0b9919c845469469cc8c352d06ed8f064ae9dc5ff5ebdc63c8d57b4.exe
    "C:\Users\Admin\AppData\Local\Temp\beab8cc8a0b9919c845469469cc8c352d06ed8f064ae9dc5ff5ebdc63c8d57b4.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DWZNJ32\login[4].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\310.tmp

    Filesize

    61KB

    MD5

    5dfc6d473e22e7a8dfec09ad1e6338c8

    SHA1

    b7ffa4d9004a6db2fdd7895bb7ad5f01f94e25b7

    SHA256

    260d1672f80cc929a2a8fd664d4bb71b5238d48ad6e3f764d8738e8a3dce6362

    SHA512

    816ade546939d25f5a65a03a0680a067a6289cea7a07aa28362c5e79a2e1408ac530e651d6092977cd8c42dc2a0405d43ee41541fad04a35f2cf00dc75700273

  • C:\Users\Admin\AppData\Local\Temp\321.tmp

    Filesize

    24KB

    MD5

    dc185f3b5eb6c745566ddb52a87f978a

    SHA1

    0ff203d200130c42e1aee0ef669b2cd8ed3d8293

    SHA256

    df2a2718ddf9e0fde720518824d46fb56404bc618d5b5e2aaedb96682285e6f0

    SHA512

    3922ebf2425d200db96f1d5fb5b728994171d8cdc43ec77c693beba74dc3eb260ac8b776fc88bc2a950410ed7a1a4395e2dea912c6e33f1c2afaa6e201380f05

  • C:\Users\Admin\AppData\Local\Temp\344.tmp

    Filesize

    42KB

    MD5

    4441a2e7aee94862e0ed9fe2975c8f56

    SHA1

    70a650d92f13e0cddbec7c3565444592c93cf270

    SHA256

    d1a029df578a8ece9bcb8205426ca5c1f824ca152e2da07aa0194f39300ed8fa

    SHA512

    7e53c86a6c0b9b9d771945f5e68ce519c8c89b513f1c2c8faa8aae70ca886ff4def4764cd375e2b3cebe403868aca33dc9aa2ac909510d3f7069b9c7ab50de08

  • C:\Users\Admin\AppData\Local\Temp\3B7.tmp

    Filesize

    481B

    MD5

    684fea6d7b0e2b5123c019984f263535

    SHA1

    08306dac3bed1882f998dc66adcf9ed98ecec148

    SHA256

    bb2d688b7939dcddeebeefc2f54b93670ad3d1e8733af37573b639fc65e0a90c

    SHA512

    85792a5e5f44ae2b43e307ac9cc2f77532fd7f47bcbae7f771a6f77c0d4ce64d9237f0f7d31e5b58e669539f0ee4fb7976e5556d2a7756a54d7e118b839d1e37

  • C:\Users\Admin\AppData\Local\Temp\DDC6.tmp

    Filesize

    481B

    MD5

    f5fec66dda330012e9ffe802bba20da5

    SHA1

    4e0ad9229f59bba73725597e645c6b919c131635

    SHA256

    405822a3958eb20c64ceb8ba8214c1a479cc237f05365a3e4f5e79f5d646ab2a

    SHA512

    2a599e58d3b28e7652ba9109ca8927dca4f8a2ffcf8b62af4b4fa2ec1c7bbf0bb025ea337db7f3f6327af342b9c216af033afdea9cf0669f4622fe03a093200c

  • C:\Users\Admin\AppData\Local\Temp\EBFA.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    49391b743fea6a59eb6a9917fc366d01

    SHA1

    18283b240101e3190851b5309cbec5e52263c2b2

    SHA256

    dea878d26d7e0e1caab42db3f8ae4655bde48a70d63a18356d34a267523d3cdc

    SHA512

    a074fbc7865ce66f79bcf5b2e160a18278087e3cc52d85761102af55f857d524491d3f1200e72ae848031bb500c399857aec09d051224d420b50edd101cb1a8e

  • memory/2892-11-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2892-12-0x0000000002650000-0x00000000026A1000-memory.dmp

    Filesize

    324KB

  • memory/2892-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2892-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2892-0-0x0000000002650000-0x00000000026A1000-memory.dmp

    Filesize

    324KB

  • memory/4140-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4140-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/4140-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4140-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4140-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/4140-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB