Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 08:19

General

  • Target

    b2a5c2fdf175364373633fb1e9c08f667066c8129fc3fd124c6ff9412c72b18fN.exe

  • Size

    218KB

  • MD5

    4237585b0d7fe8a710afe66e1cbbdd30

  • SHA1

    7d0adc7af394bb76244b0ea580d05dcda3ad048d

  • SHA256

    b2a5c2fdf175364373633fb1e9c08f667066c8129fc3fd124c6ff9412c72b18f

  • SHA512

    386e917e5c7dbb99c640ed251f24cff5a525950a16d15eacf1f368d9a0bb8a84758ea0223f08cffeb4abcdd64de5075168c017a2f996996109c369847e3dbf8d

  • SSDEEP

    3072:avm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:s1SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2a5c2fdf175364373633fb1e9c08f667066c8129fc3fd124c6ff9412c72b18fN.exe
    "C:\Users\Admin\AppData\Local\Temp\b2a5c2fdf175364373633fb1e9c08f667066c8129fc3fd124c6ff9412c72b18fN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\36BD.tmp

    Filesize

    24KB

    MD5

    546c1d857c0134587356a5dfdf57ba3c

    SHA1

    088661224ba1c2e81a36fd8d8e02a445da2025d2

    SHA256

    475af1f5cfd5a771815e2d15a7ad2870b8b599bb43f89c20fc7d64e6e1cc5b98

    SHA512

    f63f9ae499d014f6d4a981ec7b3bc7b71ef1e25ce8f8d20ac3a9372585a1abd96f26833981db89b36a9d18a285ff1274b91964735f8f64160e93fdee2f291184

  • C:\Users\Admin\AppData\Local\Temp\7C35.tmp

    Filesize

    1KB

    MD5

    48e0c15abb97fbfb8a054d8f9773141c

    SHA1

    6b460c1a31fcfdb79708c6e5b6f09ca621dcf6a9

    SHA256

    11aef58a5f83bae3ffe36bac46e22431131b0082a33bd0b4b9c3392c39d3fcb7

    SHA512

    287991638440efa29d6f1ca7bb559404f1474e94b4435d19bc0374c44ad0895ab0c2d82f72124144a68537e4f58bc62e0a20687a7b1957ef0de9cea5e43bbf6c

  • C:\Users\Admin\AppData\Local\Temp\7CE5.tmp

    Filesize

    24KB

    MD5

    8b278b2458035011bfeac08e0ec81251

    SHA1

    47d0346a2e4b3e1946f3f564ef6ae037c65b2bd2

    SHA256

    4ed801ac73f9094aa8b75750784327d03a4c1fdff22fa908338835194bd0b4c9

    SHA512

    71f13eb62965284704f6738356406e424f05c8c99e6fa643cb807a522af968084101513ae959f608a7e4770941f1ed87079a71ee2d37e912315b1859d806ce09

  • C:\Users\Admin\AppData\Local\Temp\7D87.tmp

    Filesize

    42KB

    MD5

    a5277aad18776ea76c9ceaaee7d541d3

    SHA1

    abb57634919a340906884455a4f593865aa39f19

    SHA256

    72b7e45e9dbd274e539f842fe604d3ae72572b72e452d2ac6e74ebf70e607e23

    SHA512

    885daa7e60c235fe546cbad64168976cd5b8da983599baa61dd08a2d5f7f56a05cceb2030d70b4ce3484e49892eb54146f628aee4f0debeed924b86f103ca5f0

  • C:\Users\Admin\AppData\Local\Temp\88CA.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\88CA.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\98CC.tmp

    Filesize

    61KB

    MD5

    09b0e97d9b08d52d9c9799f99d631854

    SHA1

    37064444f0dfbdd2dbb84090fda1e5ad5d3fb7f7

    SHA256

    a95c275b09df393eb5a525f6936a96520cc7c6415eea79a07fc4ef27102d8827

    SHA512

    7540c1382dce47098280ac19a3cc623339ef2b49a31b3d3701d39bca8aca605767c5092733873e2bd247ec7e803527d38a8da54f4fbed7d4206eb4d02e314b64

  • C:\Users\Admin\AppData\Local\Temp\98DD.tmp

    Filesize

    1KB

    MD5

    1c25763ef6ccb99da55605887fa46b1c

    SHA1

    51ca38a9ac41e80b64713cad94eba21eed51bed8

    SHA256

    d5ebb1826f5f6c9bf350bb1a9a5ad9d360d419d95697f1dbbdf9fcdc57cbf821

    SHA512

    731bf0f19ec52722190ab037c914cc7811ca64f2d8de334f670486bca22a27c6e58bbc37f99e5a2f8189e595a9229fe4ded4820be583e3c6716d9ab32d75b470

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    6f5273e86b2b9d6cc8ace142abf8172d

    SHA1

    fba48a74c91fee443433a4fdb579efbf572f50ce

    SHA256

    7e7b36510fa8f562131a4c9f9a9c7a0a5c00004fd65cd80a3c46bf4c501bfe92

    SHA512

    84a414e2559bb5955c091d54edabfb0274a8605b0f102e0b29b68ddb45922acf7b8e445cef1c80d62ba0fc9806ace6c2d53f37ff2bc0a8da3bdd62ff8fefa844

  • memory/1348-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/1348-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1348-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1348-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/1348-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4776-0-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB

  • memory/4776-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4776-11-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/4776-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4776-12-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB