Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 04:25

General

  • Target

    e97915b0d67fb6af558b9b943cff34df1e5bb8e281725757dd398d25dd51cd49.exe

  • Size

    204KB

  • MD5

    c422a66130a60539ed8e053e4dd98364

  • SHA1

    32cf7b42268a59d19fff89bb44bc1dbe5c4191b7

  • SHA256

    e97915b0d67fb6af558b9b943cff34df1e5bb8e281725757dd398d25dd51cd49

  • SHA512

    8eb4b47382299f8eef1a8c3b0d69eda2518b7b23a27d695dc4238ea496c4f5c0a2e8d6ed649e2b01b014c1e756bf73268e8ca77b0615e110cc951818a864e41b

  • SSDEEP

    3072:95u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:9LexkuRaX41xoyJV65gzyZko+uch

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e97915b0d67fb6af558b9b943cff34df1e5bb8e281725757dd398d25dd51cd49.exe
    "C:\Users\Admin\AppData\Local\Temp\e97915b0d67fb6af558b9b943cff34df1e5bb8e281725757dd398d25dd51cd49.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\75CD.tmp

    Filesize

    24KB

    MD5

    fc8c71369cc62984cd88da07efdc652e

    SHA1

    22f277be6c501e34597b308a4e74d012958fd489

    SHA256

    b95428332d29e59fc552c4f28a24229d2b7039b0907323ca65ddaf0edc2b52ff

    SHA512

    bd77c8ff8c96df0516e00a09b98bfad242b9980cee40b9274a1665493d19d675f7611e39ab22a35fe69832dfa0145280d334bc6cee045c103b62448d8de3edcb

  • C:\Users\Admin\AppData\Local\Temp\C8ED.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\D654.tmp

    Filesize

    61KB

    MD5

    49179ffb1d0393db43d3099b8d889364

    SHA1

    9e654a299ce657b5567914b0d760260a8f6df149

    SHA256

    45d603ac059f2b6d2e1bdabc37557ac5ef02d057c0d04612bafd101a3d96301d

    SHA512

    6a3f4cea9e15b0432eb92d11c1db7148fc1ba4848d77498bd5f2c6b34bc42c8193a9d5434400269ddf43e1dfb062ea927d178c515ab604d9e28d5743ad6a8945

  • C:\Users\Admin\AppData\Local\Temp\D665.tmp

    Filesize

    42KB

    MD5

    5872c9ad1970bd91b0789c232c97512f

    SHA1

    b715991437e7793edd85c5dac9594e1cdf97436d

    SHA256

    02cd560fbefcf2e9e5393d02c8d9f0de24d778007807f5dce39a97cc611bce06

    SHA512

    451be552f3463e2feddbffd70d28cf71439a4cd50c4e20a1cddb471e193bd633f66a43e8d0d3c13f4171fff91383562db422d88ca97a275697c7cabbf753a3f7

  • C:\Windows\apppatch\svchost.exe

    Filesize

    204KB

    MD5

    c7b6e5f521178833b4dc511091caaa0c

    SHA1

    2747c4b106f9048e71d5c5feac692449fc203fbf

    SHA256

    ffbba663bacefa97ff5ba20ac3ef9e145928a3482e82f6a603ed4b442b677ce7

    SHA512

    7a1facd5062890d0db0a1018c722994e0febe615e4c52faab3b0ca058a5856c18f6e4385b920c38348889a948904c8fb6581f7fc9895aff8e6c607f672905a8f

  • memory/116-57-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-24-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-12-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/116-19-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/116-20-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-52-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-22-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-45-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-28-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-51-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-79-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-78-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-77-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-75-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-74-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-73-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-72-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-71-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-70-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-69-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-68-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-67-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-66-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-53-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-65-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-64-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-63-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-62-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-60-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-58-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/116-56-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-55-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-54-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-13-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/116-18-0x0000000002AB0000-0x0000000002B58000-memory.dmp

    Filesize

    672KB

  • memory/116-59-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-50-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-49-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-48-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-47-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-46-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-44-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-43-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-42-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-41-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-40-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-39-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-38-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-37-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-36-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-35-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-34-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-33-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-32-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-31-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-30-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-29-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-27-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-26-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-76-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-61-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/116-25-0x0000000002CA0000-0x0000000002D56000-memory.dmp

    Filesize

    728KB

  • memory/440-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/440-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/440-1-0x00000000022F0000-0x0000000002341000-memory.dmp

    Filesize

    324KB

  • memory/440-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/440-15-0x00000000022F0000-0x0000000002341000-memory.dmp

    Filesize

    324KB

  • memory/440-14-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB