Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/12/2024, 05:51

General

  • Target

    5fcc54f24bc9d816124647969960d8fc77864f2f664b4fd57340eaceb962ac27N.exe

  • Size

    711KB

  • MD5

    cb9be790acd6cb3c57049783556374d0

  • SHA1

    907a2ccb34a68cdfcc42ad6a23857c221eb799ed

  • SHA256

    5fcc54f24bc9d816124647969960d8fc77864f2f664b4fd57340eaceb962ac27

  • SHA512

    4b0df2648c570f8203dc3ba37a8fae72c814501df8727191858f88073cf5246d2f66969956c2c35a049341b2852650e073bef5c81df1b2ad3fe35595cc6e7019

  • SSDEEP

    12288:YmWhND9yJz+b1FcMLmp2ATTSsdsmWhND9yJz+b1FcMLmp2ATTSsdS:YmUNJyJqb1FcMap2ATT5qmUNJyJqb1FB

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fcc54f24bc9d816124647969960d8fc77864f2f664b4fd57340eaceb962ac27N.exe
    "C:\Users\Admin\AppData\Local\Temp\5fcc54f24bc9d816124647969960d8fc77864f2f664b4fd57340eaceb962ac27N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8A1F.tmp

    Filesize

    1KB

    MD5

    3bd3c96b40defeed1367404762c4977f

    SHA1

    82280d70316a71992e762f0cc834a941c7d96172

    SHA256

    4e4eeed9809ad1db2d2386ea01be464770b902d97a5e7452b78390711d58d720

    SHA512

    94f4d974cae534ccd15ae370335b1527d633d3334237ccfe98592b8934a6794c2922181fc90dcc5e4130d3dbc364ff941ed98620fd84c4247929d9bde84b04e7

  • C:\Users\Admin\AppData\Local\Temp\E188.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\EEFA.tmp

    Filesize

    61KB

    MD5

    92515908191027bfc8124c0e2e3b8144

    SHA1

    5b4a790b4798db5641b0b72b9bd1abbd68dfefbe

    SHA256

    bcc412b21d1a2673ce1119cbf5b06d7fca3dab1edb1538382c0ede19abd72d63

    SHA512

    1bdc3dba68799be77373bb2b1a09e5e7b0a8d3e8fc61318d7c74b13017b68c1c13190ab9d847ec438d0d788abef73d64558f5277f799211cabfc14f8c8643a1e

  • C:\Users\Admin\AppData\Local\Temp\EF0F.tmp

    Filesize

    42KB

    MD5

    cd5967cf38f21f3297cc873f484c3bf4

    SHA1

    6bc994aa747266da7a1c7d9a46af0cb328ec4987

    SHA256

    31a09fc5e39e52bd83fd8e98a0c85dc78ae05b26cbfb0f95358f5711398de8e0

    SHA512

    a87b1c2f8f48811607f11d5acc797a32fa7a287eab6cfd0e72b6b1eb10d255215266bc10ac56e7a7cd84b908fcccc01cc545a57168111d38502efa2dc5ae77f2

  • C:\Users\Admin\AppData\Local\Temp\EF0F.tmp

    Filesize

    42KB

    MD5

    5c5dec022c86cbe0ba1f5bacfd9e2ecb

    SHA1

    bdc0701dec0a18558bb264615bfc702ad7d6deab

    SHA256

    a15c245bce4cbcc1d9d8cd0e6166c154c96d60a016cf61205d4ed6cc24e5bc5e

    SHA512

    2f256af2eea25c8734a6fc174b36a11ca4db51cac728596669ca13193076ac8aa0fd362feb02916c893e28bc24b8329b758b37a729125bbfd3e23170d8925ade

  • C:\Windows\apppatch\svchost.exe

    Filesize

    711KB

    MD5

    7ed0c0ce239f26a3d8340816d9154c54

    SHA1

    03cb1088ed5970e982a41ffbd274b97530d0b0d6

    SHA256

    aed9b933a5b494d457f34f804aaad39011ad2d108af06179f6d452b715107764

    SHA512

    baca615f0b2d18307b701280dfa0ebfd98b927ec9f91413ad09ba749913e791ae6e27525cc9c80ca8bd5637d91f052892080adb367d33d44af1c81848b1631bd

  • memory/3084-8-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/5024-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-14-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-10-0x0000000002720000-0x00000000027C8000-memory.dmp

    Filesize

    672KB

  • memory/5024-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-11-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/5024-175-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB