Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 01:39

General

  • Target

    91baed087948f4c2e543a8ded75ae3a9647cdbac7d08f790f959586a1302febfN.exe

  • Size

    208KB

  • MD5

    46ca2078e016deca6fde711f6c1b9b90

  • SHA1

    3695ad848d1636bd1ded0873047d918f1d9d5e4f

  • SHA256

    91baed087948f4c2e543a8ded75ae3a9647cdbac7d08f790f959586a1302febf

  • SHA512

    d56f15a87b51bed9e1a63153935e643f4f0ff6c019d847668be41dffd416f8883d4da02f7c1d33730dd66f86348766271214afe58edf5889c527a512aa98c1cb

  • SSDEEP

    6144:za1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfkw:zbapK0JCmRcU9vVokfj

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91baed087948f4c2e543a8ded75ae3a9647cdbac7d08f790f959586a1302febfN.exe
    "C:\Users\Admin\AppData\Local\Temp\91baed087948f4c2e543a8ded75ae3a9647cdbac7d08f790f959586a1302febfN.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8R55UT9S\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\2AF0.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\3EED.tmp

    Filesize

    61KB

    MD5

    c960bf722fd9ee00e47bced18e5622a1

    SHA1

    b911966020e3037ee645ec1d968f0cfede92bb9b

    SHA256

    56a7822613719725f8bfa317a722914394a5b9fd875938ab2bc2adce82e7554c

    SHA512

    2289200ce2560a4f58a179f10cc6a74f3bed31087f89532799fafea035511ac6ba1b46954cf31fa30fd18fac57419fe649aac6b356f99202eebb18d11bbb152d

  • C:\Users\Admin\AppData\Local\Temp\3F53.tmp

    Filesize

    41KB

    MD5

    f2ab0b5a3a6be7ea1666edae7b0dd02f

    SHA1

    cd7ea50b29841db0b5855e777bd24e9bab72306d

    SHA256

    6c24717ba18a6cfcbf681b260d02c694f84cd7726894a9ca0b0527ffc5ba9cb6

    SHA512

    5089de995610f3f6034ecb8a2c6d386d460c8e4aaf12c4c2ab36bdf7165182335452a09db082b02da9f83006026edc0f5f45ef5ffc2e635ec64d05966a8fcb49

  • C:\Users\Admin\AppData\Local\Temp\3F53.tmp

    Filesize

    41KB

    MD5

    f9daedc934caa96533bb1f50c372eb79

    SHA1

    061b13f961da5d796a73fc56d1446c6ff4afd484

    SHA256

    f7486b55f1e0791d6b724a50eaa8e80f4d52bd90e8070a5c02179a7b2e1bfc90

    SHA512

    656cb2b0f42b10cb2edff3ff1ddb5a8e689a170a394894bc394ebb099e19f762370148655f8d39ddc3964cac596f5ba6ec6436c97b0a7d6c3d0888471e2786f4

  • C:\Users\Admin\AppData\Local\Temp\877F.tmp

    Filesize

    1KB

    MD5

    9a0f36fa616b658b541eb698fc174092

    SHA1

    9aaea128782915c2767ef3549a25e7902e15a66d

    SHA256

    13f46f205e114254b08d1b4f09bb15c30a11d21e7fe7784ea3d4c505908ce387

    SHA512

    3f54c07450e1b8adcc03a950f23de310c818a12452e1d09eb8ac7b59f7a648fae490ae6f4f482917c5b8a5236ab774b248317036a613793a853f6447fe4ad1cb

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    93a498eebd046d80b01dd5e8c0149b63

    SHA1

    8afca7b3d4172267691265086e2adb73b06680fd

    SHA256

    ffc728410ff88490cdf8628db6b1fa32838af16b8ade00094b3fba0260bf7c1b

    SHA512

    98306a970dac589ad27e9641dc659ad7f9de4a6359d8fc2d6dbf18e2511aa1ac17b26aa2428d89994aca8f14aa8545c6afdf90c7205b7291164a9df8e1485c62

  • memory/4068-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4068-11-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4068-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4068-12-0x0000000000590000-0x0000000000593000-memory.dmp

    Filesize

    12KB

  • memory/4068-0-0x0000000000590000-0x0000000000593000-memory.dmp

    Filesize

    12KB

  • memory/4672-56-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-50-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-46-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-79-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-78-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-77-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-76-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-75-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-20-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-74-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-73-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-72-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-71-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-70-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-69-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-68-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-67-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-66-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-65-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-64-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-62-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-61-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-60-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-59-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-58-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-57-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-22-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-55-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-54-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-53-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-52-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-30-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-48-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-49-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-47-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-43-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-45-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-44-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-42-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-41-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-40-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-39-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-38-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-37-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-36-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-35-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-34-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-33-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-32-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-31-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-29-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-28-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-27-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-26-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-25-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-24-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-63-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-51-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-23-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-18-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/4672-17-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4672-16-0x0000000002A00000-0x0000000002AA8000-memory.dmp

    Filesize

    672KB

  • memory/4672-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4672-14-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB