Analysis

  • max time kernel
    111s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 21:52

General

  • Target

    08be891d65a82188d0cfb6507273c16bcdab75aab7803593f577256d6ca63d6dN.exe

  • Size

    218KB

  • MD5

    697b882ec61dcce8ce18df54768beec0

  • SHA1

    89cb25843c5e4f24053e50374f25892bb0505ec2

  • SHA256

    08be891d65a82188d0cfb6507273c16bcdab75aab7803593f577256d6ca63d6d

  • SHA512

    0fd0558d8e7fc8a73fc342089d0ebc2afab70378ddb33d0549c129209b88f03365d4c6011cc91ff60691ef909d8ec5fbc841f12f39967eadcad4fef2bda63b87

  • SSDEEP

    3072:Ivm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:G1SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08be891d65a82188d0cfb6507273c16bcdab75aab7803593f577256d6ca63d6dN.exe
    "C:\Users\Admin\AppData\Local\Temp\08be891d65a82188d0cfb6507273c16bcdab75aab7803593f577256d6ca63d6dN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FQRZN8O7\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\31EA.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\6E38.tmp

    Filesize

    24KB

    MD5

    8b413c466791ad67074882b41c8ffb74

    SHA1

    de8b4c208b6fdfc84ef19b54b5c78c2aa25b4f11

    SHA256

    0a60b0f89634d84f816905b8dfc00b8aa1d17603c9dc6d50ca554d2e6121dbc1

    SHA512

    f72e3b8c076c5bfc7f5119d0fb867fc6095c1222bd668369644ed96e66f05ab05ffb177e6620f1ea5c18e37b1e902b4e124a1e25320d647cf65594f85a5b53e5

  • C:\Users\Admin\AppData\Local\Temp\6EA7.tmp

    Filesize

    1KB

    MD5

    0881f3722d5638b379ee98bfe7a4adfa

    SHA1

    f2840ce727b6e767e6d482ce4dcd2d58316873ea

    SHA256

    140881fecb8060d092809bbc5dd41ebeda53490e20e5fe129d51ce4e72378fd5

    SHA512

    f72b6c2e0c1d178776983be5a8404637a97cfbbff86f499fa6a7ded521dd7a377167478c03f1c4092cdec6f59ff962951c82a41d5ace977743312f95c2f23cc1

  • C:\Users\Admin\AppData\Local\Temp\9963.tmp

    Filesize

    61KB

    MD5

    2be21e6c01e08e02c8d83763b2e15837

    SHA1

    6423b6d96d791e8d113cf6ea59cb939d74f5609f

    SHA256

    71147dc05274d9ce5614c43c20ee245179a99bb41ea7c8302128a6e7d81de1cf

    SHA512

    863e69c874594b993e92e4a659efc97013474e2e0b73335e1af910552c4bdd2fb49cb3b83e6fef258e797b335c58defb50c7e2059e2034e7bd9f5d9b12981b19

  • C:\Users\Admin\AppData\Local\Temp\9985.tmp

    Filesize

    1KB

    MD5

    c472828a60212f0c31c1916a08d303c6

    SHA1

    b52037204c03a8518bead8d2a93db2d75e2f3b96

    SHA256

    06b8b61eadf69ce786a5c5eaec573d849f8897ef4c63506853adc22bbdcd783d

    SHA512

    12a28ae6addaebb7df765c361b1556201422adf2926df51874ed52c12a3a35133c5b3bfee3c8fe15fa525b3461ac376c487386baa3a75f5c48272ca914c708b4

  • C:\Users\Admin\AppData\Local\Temp\9A35.tmp

    Filesize

    42KB

    MD5

    96051c346c443b15351e24692fe2cd0b

    SHA1

    2eb48830e8e8c106aba86458988cf8ee38a7e1ed

    SHA256

    e71088e17d0ed5240051bb455367f6e950b25d1f30ea6ff9af813aefa699f2c4

    SHA512

    726968f93639221c83019f5399795f2a8153ecf7a19c3d23e8cfeaf4960b2bb44ff2a671f43afcaa00b37023c1179de08b00469b78959536bc349258761c0af4

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    c59c73d5205758b1ddb0eff2e7cc5674

    SHA1

    ffa959067ba4c25c36b517f02040e39d0bef1c29

    SHA256

    22545e81bdf7804491f96f64ca091b20182409cf29b3f6a1f40f0d7b90056404

    SHA512

    438022f7ed0b2e188015f8a591f46bcb1eda210afcdac7bd8dda3b3a95bce5bf984be487b78de3d104f97474699a7e51c7a0d25fb240032e1f8d31fe47ea520f

  • memory/1656-13-0x00000000026B0000-0x0000000002701000-memory.dmp

    Filesize

    324KB

  • memory/1656-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1656-12-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1656-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1656-0-0x00000000026B0000-0x0000000002701000-memory.dmp

    Filesize

    324KB

  • memory/3536-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3536-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3536-16-0x00000000028C0000-0x0000000002968000-memory.dmp

    Filesize

    672KB

  • memory/3536-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3536-11-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3536-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB