Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 09:43

General

  • Target

    fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe

  • Size

    208KB

  • MD5

    2bc2b5ab3d83a5fda7afc48e24c91db7

  • SHA1

    92bc15258519e97a0b87431bc85d8a88ca2d8d1d

  • SHA256

    fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b

  • SHA512

    8ca4873f2d3aa0dfb2f37b5792e7851138c5ad594416de0e7140b34f33efa6e4835da5fce101d23d45e414c8f4058d04f9d51c5693bd08b6f2a938ef185526ef

  • SSDEEP

    6144:Qa1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfk:QbapK0JCmRcU9vVokf

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe
    "C:\Users\Admin\AppData\Local\Temp\fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7A1D.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\7A1D.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\8A5D.tmp

    Filesize

    61KB

    MD5

    7c4773be739282548c59738780217ea8

    SHA1

    61c93d48c732f04d11c9cd38711323f928bfb5f0

    SHA256

    79246e31efe764d111c98ce7bd93a61d7dc8b81019413699f029ccc25de73865

    SHA512

    d1c340adbb517a3f0a10e6a590d88306ab46ce9d51e23730d970c929d562c9bfdfab629461036647db5dec7c518277993a11d80d738cfeaaf0eba42584dd6b4e

  • C:\Users\Admin\AppData\Local\Temp\8A5F.tmp

    Filesize

    1KB

    MD5

    5d98e25dcf48c6c8b4be7dafbbfffc92

    SHA1

    04220dc3df6624a0097a383a03681c91a125c8e7

    SHA256

    4aac6d241c6d43241742fb2e1624414a15194fd01dff163c49e8081da387f614

    SHA512

    e87163e794a7540c123aabbfbdf55a52570f1ef61d42a5ac40003683a0102845bc8cd19180b3e2341a4f156a6431be8665f4188b86971656c9ab9412f6aa3345

  • C:\Users\Admin\AppData\Local\Temp\8B32.tmp

    Filesize

    42KB

    MD5

    a1babd4bc3c6af3c0eb2c50bd2e37ce1

    SHA1

    d8bc872156f31cf4b8a2d32d82cd67902bf0091c

    SHA256

    87831b7a45c260bc0cc9caf20438ca5fe73bc44cb6e01f2302f03ccae48600ef

    SHA512

    6bd5d5a3854ed12929e53316abc61d82e4f79db50c37d9ec7e1ed0a365d2534a2f955f4c4559aea728addfd877e3d2ac2c5636020d2a908e3fd522617022f06f

  • C:\Users\Admin\AppData\Local\Temp\B8A2.tmp

    Filesize

    24KB

    MD5

    ca219f03605a3a93f66cc8ae507aa561

    SHA1

    c8c0882ff70c46ee9f675dbc97e8b360a8c958ee

    SHA256

    d1943a0b9b8d7f0156876602d2cb18f7d294b0bb3a3b92dc0a5358b8deda2df1

    SHA512

    2b50913f1ae6f4f8915e39908929f90418f6b6cb623564f1636794fa441f34eb590cb02ec00d14e0452717e845a2b11da96795c8c99aa5d3d9623af8bfb6b2dc

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    52b6f1dba123182d5c9ca91808985bce

    SHA1

    9b24ec24662344ef102b9166e2e9fbb4e7f9ef26

    SHA256

    50fbdab13097abe4076e1f9e90ee98d7bf6e79abeee546de9b2f7cedae43523a

    SHA512

    54661b375be9201172f09704972e36a0428e8e6df8fb2feee61d9caa6863d50e8a3bc786e1dd954da1c0682f914e83648f090d0c5ffe970eeb40921846b8c504

  • memory/2884-48-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-74-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-50-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-55-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-79-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-44-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-77-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-76-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-75-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-43-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-73-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-71-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-70-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-69-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-68-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-67-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-66-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-65-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-64-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-63-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-62-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-61-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-60-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-59-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-57-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-56-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-54-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-53-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-52-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-51-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-49-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-20-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-47-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-46-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-45-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-78-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-18-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-42-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-41-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-40-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-39-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-38-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-36-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-35-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-34-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-33-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-32-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-31-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-30-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-29-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-28-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-27-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-25-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-72-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-23-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-58-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-37-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-26-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-24-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-22-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2884-14-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2884-17-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2884-16-0x0000000002A00000-0x0000000002AA8000-memory.dmp

    Filesize

    672KB

  • memory/2884-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3304-0-0x00000000004C0000-0x00000000004C3000-memory.dmp

    Filesize

    12KB

  • memory/3304-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3304-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3304-11-0x00000000004C0000-0x00000000004C3000-memory.dmp

    Filesize

    12KB

  • memory/3304-10-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB