Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 08:53

General

  • Target

    8dc47bcab58b6b00866428b48962a9ce9c4aea0f95704a63249c9cc6307fe0c2.exe

  • Size

    375KB

  • MD5

    72961f3f7a8686c7d6c76e4e8273c2e7

  • SHA1

    e901ca470cbff013a18bceb4253e5d01c6b0d1df

  • SHA256

    8dc47bcab58b6b00866428b48962a9ce9c4aea0f95704a63249c9cc6307fe0c2

  • SHA512

    bbd00a1b038c060140de1fd4250e655cbd5d3b6e2fdd6228784bdce6eab3098911e9c99547943fc9a500bd80fa615e3d1d61230047e280fc848f25d3c936e8bb

  • SSDEEP

    6144:R3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Eis:WmWhND9yJz+b1FcMLmp2ATTSsds

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dc47bcab58b6b00866428b48962a9ce9c4aea0f95704a63249c9cc6307fe0c2.exe
    "C:\Users\Admin\AppData\Local\Temp\8dc47bcab58b6b00866428b48962a9ce9c4aea0f95704a63249c9cc6307fe0c2.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ABC2.tmp

    Filesize

    24KB

    MD5

    2b5f1894b6ac250f84ce10428d4dedfa

    SHA1

    a148dc0d1e4b5f4260cbf66b055ec0fb68daed82

    SHA256

    ba75ef19c13b5b070d21a380229b06320ef99012c9b64e45bc10c00d803b1398

    SHA512

    bfec677e2601b24e98d9c437e3290cb9f5936ffa7cbc2184113eb5c89c8ec3d5cd849c6f5f3c0b7838432a4af73b761fd73b64973f53dd2658f770547661713e

  • C:\Users\Admin\AppData\Local\Temp\AC23.tmp

    Filesize

    1KB

    MD5

    efc816277a8112676c48283d36957689

    SHA1

    aaf7306c1f09afce6b2840d55c16ab2c5e3437d9

    SHA256

    a9690bc8a73a9afefe9bcf6717056f44829ae6770fa0b935f784089073903616

    SHA512

    3853910ffffa24d7b72c2302d56ef355ca821b8edde53362af04453d4010c729cafc81b208477b3b6972d5e28d25f20087245d5df7bc8d514b1dd360dba67932

  • C:\Users\Admin\AppData\Local\Temp\BEC7.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\CC79.tmp

    Filesize

    1KB

    MD5

    82322ddcbafbbec75d86f376e7889700

    SHA1

    238efc90b4be08e24134130d9876d61b550d3cfe

    SHA256

    8b275c7c8346a7395fd3cd95a0c973856c0acf1779b283bb112eb0f0021cc5db

    SHA512

    ad761f435c10688eecf93669bd7bc09dd0acbea00bc75b6b687ad568cb8d7a6d56c02567915d6df8cfcd43d96728fc901d35ae289ea3754a1f2062245fea4ac2

  • C:\Users\Admin\AppData\Local\Temp\CC8A.tmp

    Filesize

    61KB

    MD5

    b1a0c3ae0f583f28c3a654dd7c9a7c25

    SHA1

    de79a038c2003249c66cc3b4a066f2ae4abd72b4

    SHA256

    5271985dadb6a7cd5c66c76e98280ad954864ae73657812e41836efeed3301c1

    SHA512

    63b720454eb1138cdde24674ffc5f948fe2ae8cd09e230735a97f0757b75c3a5dd52346f2876d7a506f3d5d474eb5b5260a59fbfc17f85af76b4ef6086df9ace

  • C:\Users\Admin\AppData\Local\Temp\CCDE.tmp

    Filesize

    42KB

    MD5

    6efcd74eb3ce0a35bf355443c25ef2a3

    SHA1

    2f797420f66147149e9f74ed233716b5f101709a

    SHA256

    fd6df376b10a913c41e4a6b726f28bca633a20b1bbbe80e0bcc7ac6fc9ed484e

    SHA512

    c237482347b4d8f291db7d69797bb36a29dfb9c289dec696395cebde5207a0d1259a0cad23e2a5ca1c47797331e6f0a67b0d0ba4cf58fd9e242f60881afadd82

  • C:\Users\Admin\AppData\Local\Temp\CCDE.tmp

    Filesize

    42KB

    MD5

    385eab3b3942a7d789ff6b6f448941b3

    SHA1

    a4f84fb3b61c2a270aee2d0a07a2c62621be2862

    SHA256

    ac8730c9771f23d580c32005b99f8784c80aa52005c37ea51a148687fffcebd7

    SHA512

    afe893cc00b7a3451f2d882e19cb071a69d48f66d82ce93723cae8355d4da7e641567d0c15360c8393e1d39a847a90be88c03953e2fc64fa7d2550acaa328311

  • C:\Windows\apppatch\svchost.exe

    Filesize

    375KB

    MD5

    71c14482ead79fb415f89940ee5fc9d4

    SHA1

    b669111275f7dd250425f23b15d987e2de7ff38f

    SHA256

    9a2bda0444d8d77a42168e669084ea4cffa48cd78e12f81303992ff25f13b328

    SHA512

    5507ba34afcfaa2f69f565e6ade79aac1fbd557517571d9b8c9f1d0e319d485d8aa77af6e55655ecd5b7926bcce99146a8ce632e48ff4b1db0792a4406382b31

  • memory/244-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-61-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-73-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-72-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-69-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-67-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-65-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-63-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-59-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-57-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-55-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-54-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-53-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-52-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-49-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-48-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-47-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-46-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-58-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-44-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-35-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-74-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-37-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-36-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-41-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-31-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-30-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-25-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-56-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-40-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-28-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-184-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/244-185-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

    Filesize

    728KB

  • memory/244-12-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/244-9-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/3656-0-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/3656-11-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB