Analysis

  • max time kernel
    111s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 05:55

General

  • Target

    c9612984e07c835d8208b3515f21cd26f0ac94c6cdf0665e57e532f01f30a718N.exe

  • Size

    218KB

  • MD5

    76cb989c53f194cbb1445545f89cb630

  • SHA1

    73dad85a0d8a7850cd8f25ec89de781e38c5b151

  • SHA256

    c9612984e07c835d8208b3515f21cd26f0ac94c6cdf0665e57e532f01f30a718

  • SHA512

    fd82b04d11cacbab849c919543dbde32c866ec4ff1ac29a5ead9b644e14d8e27906e2ac42cf97c00ce6a919a0e51621a62e163e7fd95a079b6b7e6f57126577b

  • SSDEEP

    3072:hvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2Hq:l1SyAJp6rjn1gOObn4b6h9p

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9612984e07c835d8208b3515f21cd26f0ac94c6cdf0665e57e532f01f30a718N.exe
    "C:\Users\Admin\AppData\Local\Temp\c9612984e07c835d8208b3515f21cd26f0ac94c6cdf0665e57e532f01f30a718N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AEB0.tmp

    Filesize

    24KB

    MD5

    ce0a66317ef8b862f71ec729a9c23b47

    SHA1

    84773c874fb8d547060f93976882172d699098d2

    SHA256

    64e1f3f19ac2b7b016ad3dd208b452325781f3c76830dce0303ddbac6fe44fb4

    SHA512

    d93f459f8977e436093897d7d435e035daa73d35c5149755aff1a7fcdb485eb8e6c3369cf112216f192237c8d448485768ed90ef3ae6291b058d2fbd87a43400

  • C:\Users\Admin\AppData\Local\Temp\AF0E.tmp

    Filesize

    61KB

    MD5

    277ccd9027c9efd0c011a2776bda2eb6

    SHA1

    933dc796cb772fc2e37c7b616125e8929326cdd2

    SHA256

    dcd29243609da2d326a5b8506fabd09627e533406e23414654882782ea719ab9

    SHA512

    7a237ef934a7812bd82e96ff30b37b21ea889117104f400288292c98f201084c0710a385b9702143ec45fdc82631b1ba8a8fc9862df131e57c30c0ea8447c5fd

  • C:\Users\Admin\AppData\Local\Temp\EF43.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\FDF3.tmp

    Filesize

    42KB

    MD5

    eeb2b7200e6648c44d70eaf673b60465

    SHA1

    1f22738b60b3a1783d0c1d5271b087db6992d37e

    SHA256

    7825c7193c64a2bc663afd2c802815bbff8f5f944363c36eef9501c58cb6e3f1

    SHA512

    82e87c515fa06dce5d5b8cfe2e44f663996164a7c3d42d8ee4471d5585aefa44846724bdd0c9047947d020da4af7ef5c5aef411186063cd2e6906ac9686a4df7

  • C:\Users\Admin\AppData\Local\Temp\FDF3.tmp

    Filesize

    42KB

    MD5

    27bea3d80c33928bca31f956719231d3

    SHA1

    e20be82757c8c3888a0389a090f579a959e931ed

    SHA256

    d7c66deeb1f91cd60b177728173a3d87a1f6d630a71a428aa0c464feb1c33ffd

    SHA512

    d5c2c59e58bf093f6ffdb73cc4f49c560c008dbb5d084648d2422f42d33eaedf6fdbc0e1c3f454c8e012a386cfb2cadfd16dcddbffbc2d688fb7a7be7e008a58

  • C:\Users\Admin\AppData\Local\Temp\FE45.tmp

    Filesize

    1KB

    MD5

    2c8b0c6af7846d4502e6dec6dc123cf9

    SHA1

    a3bbb42a39f35cf38fcf3445591a0491cacefa30

    SHA256

    af5c49334149dde051d039ee2285a3c26a6abda2671c4d87a2506a74fca377f8

    SHA512

    b07b050111f32b75d37643c9509487a8328426b122223629a9b44da9e6a9bbd6fd53a9907743c29dd224c0555dbd1c551f1e39226809d5d19fefece67b3da131

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    091de235da6b64713b37b2f6c9323a41

    SHA1

    abe6c18ca5c7350627d08fc125c651d6c89bb38b

    SHA256

    2fd1e3d2db4cb7c513f3d6f5c080e392a26e0250d367c2ce4947e38cd3df632f

    SHA512

    5e6a411f70a16da3d652679d2dd8a038a79c6f6e5daa5e391c3bc4c0b5d580e86bd4bb1f13b63e32c88f9058684b84da5b7e15a9106ded97e2488995ab807a9a

  • memory/3332-51-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-79-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-50-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-56-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-45-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-78-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-77-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-76-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-44-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-74-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-73-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-72-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-71-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-70-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-68-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-67-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-66-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-65-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-64-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-63-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-62-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-61-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-60-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-59-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-58-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-57-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-55-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-54-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-53-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-52-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-49-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-48-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-14-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3332-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-75-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-43-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-42-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-41-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-40-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-39-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-38-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-37-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-36-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-35-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-34-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-33-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-31-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-30-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-28-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-27-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-26-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-25-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-69-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-23-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-47-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-32-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-29-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-24-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-46-0x0000000002D00000-0x0000000002DB6000-memory.dmp

    Filesize

    728KB

  • memory/3332-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3332-17-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/3332-16-0x00000000028D0000-0x0000000002978000-memory.dmp

    Filesize

    672KB

  • memory/4180-0-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB

  • memory/4180-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4180-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4180-11-0x0000000002310000-0x0000000002361000-memory.dmp

    Filesize

    324KB

  • memory/4180-10-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB