Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 19:19

General

  • Target

    3e7738d12a4f5555f35ebd0e27897b9df6b01e4d3499e1c8e1f489c35089a42b.exe

  • Size

    218KB

  • MD5

    7589517ba24bb47f7c6dba00581e1e17

  • SHA1

    d3bcf2d105d4d491c7076afd851d337dfd463d96

  • SHA256

    3e7738d12a4f5555f35ebd0e27897b9df6b01e4d3499e1c8e1f489c35089a42b

  • SHA512

    618fd33db6ace1fa63dcfc2bdeba49a37b152b051723e671e6c463992910d73bf53d8ce2c155241b74aed77425c9ce592096d790cddbfe6e6a662294fb9e63d2

  • SSDEEP

    6144:VEQBDdO1z7L/EIhZDE9oLfFWlMZT7+DGaMwIC:VEGDdQNHEwWlMxYG/wI

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e7738d12a4f5555f35ebd0e27897b9df6b01e4d3499e1c8e1f489c35089a42b.exe
    "C:\Users\Admin\AppData\Local\Temp\3e7738d12a4f5555f35ebd0e27897b9df6b01e4d3499e1c8e1f489c35089a42b.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WQOY74U4\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\E970.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\FDEA.tmp

    Filesize

    24KB

    MD5

    d1997ca2dad65d111032e4933de7f09d

    SHA1

    993c0cb8c2cfedd8fdd3609dd9a38ac29d973c0f

    SHA256

    aa4ed67c4924cde200f0813d1262ba1d2beba255a1891236d24d1507e1ecdc13

    SHA512

    3706c2765536ac778e1f8bca0358a2b85f2db85cf3513ef8683fb1cbef74e2edbe4273a35fb81fd15298551af0db35f3019a76d1aec5d3e16800a59ed85c1bb4

  • C:\Users\Admin\AppData\Local\Temp\FE4C.tmp

    Filesize

    61KB

    MD5

    6b559efb2396ad4f51b6563a2d1927f0

    SHA1

    1a662b67eb03b5a444004909090575b28a77c4f7

    SHA256

    ba0bb3e51fbcf566afbf890ebb6ccf288dde753a32ad2533457504b1752576b1

    SHA512

    13a1cc8112bd5db8f86b377a2a85128e2c18619ebd0db1f4fe40f7795e75803bd06af673f78586dafe9c89fbf3f9148dfc62d08be7029cc169dc3606a5cfb588

  • C:\Users\Admin\AppData\Local\Temp\FEBF.tmp

    Filesize

    100KB

    MD5

    75100afb24a543551d2d3f75dc8209b2

    SHA1

    d7d8de30191613a9a0c28d569d2775295b1ed253

    SHA256

    4800afcc1814af1b49cb912a74be660cfeef783103fc535a949e1748c84b0ed1

    SHA512

    47a7abbb434ea52b32b1afdd3acfbc83040af19e0ddb06c8a60bc861394d41ad85b5c983bb052be52848ab00f515319055e22d5115a69416e89d69e64c9ace84

  • C:\Users\Admin\AppData\Local\Temp\FEBF.tmp

    Filesize

    100KB

    MD5

    1b9303b93cfb414dbf358730a6110296

    SHA1

    c1c6e3acf6b4e8fa2978e18f462c2709fda6497d

    SHA256

    88d51e28f66998cb5faaed338a35458aef7c40d506f204a59e087f282dbb1233

    SHA512

    61ba0bf202d51e02e02674cd9c8987428d9802eda05ee287fa841a6c62726d27530773ef1809ff6d39bd5556646537e2b2f77c2d30b3ce845af7a2905a4b36a0

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    5831c9f6f7a8adf1ec7e15f2a60360a8

    SHA1

    104fe4d0286899d5640b66a37d5fd8a4166ffe61

    SHA256

    df3c69ae521805c211a2628b77066617834c02d3f71a6c78d21d6398208f7077

    SHA512

    bb4610e79dd803ea5391809e1184160d8a456394769d7ba2afafa38e6379ac82b639630794da79f647664c0ef8d0b141c9aa912d4dd9f8a2283d926d8b301e2d

  • memory/592-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/592-15-0x0000000002420000-0x0000000002471000-memory.dmp

    Filesize

    324KB

  • memory/592-14-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/592-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/592-1-0x0000000002420000-0x0000000002471000-memory.dmp

    Filesize

    324KB

  • memory/592-0-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2800-58-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-48-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-20-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-24-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-22-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-39-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-44-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-79-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-78-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-77-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-76-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-75-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-74-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-72-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-71-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-69-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-68-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-67-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-66-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-65-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-64-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-63-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-62-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-59-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-60-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-18-0x0000000002C00000-0x0000000002CA8000-memory.dmp

    Filesize

    672KB

  • memory/2800-55-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-54-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-52-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-51-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-49-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-19-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2800-46-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-45-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-43-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-42-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-41-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-40-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-38-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-37-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-36-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-35-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-34-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-33-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-32-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-31-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-30-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-28-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-27-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-26-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-73-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-70-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-61-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-57-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-56-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-25-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-53-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-17-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2800-13-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2800-12-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2800-50-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-47-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2800-29-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB