Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 03:29

General

  • Target

    d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe

  • Size

    211KB

  • MD5

    09a8232b4699b81ec88ba00cb0c6aac7

  • SHA1

    d713d20abc8d0ed8894b45215732327f499f0c8c

  • SHA256

    d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112

  • SHA512

    c1e0d17ba0738a53f8b162ec5071ea745ea7a8bba170dc5dc3d9684659b518f36c2a395a41da0299711572dfbb5f04019f5f16b3323d98fa3dc5821d9366adeb

  • SSDEEP

    3072:lg/T01/NkSp48GzFoMVZrjB2+4M9eOpssvSX4FzU5chdhGulEV5SCmGFkInV/0at:WErGjVqiFPGYrGZMCrCIn6aQdM

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe
    "C:\Users\Admin\AppData\Local\Temp\d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    211KB

    MD5

    b8b2c6067eeb3bbd0020aec94b38859d

    SHA1

    a97c179f2390312d249052501594b5f5a383a99f

    SHA256

    906b5e6a8522dcfe15168ea975c00678f2d3a850adca4ec198e0bb6bb49f913a

    SHA512

    d1b3ee7c6d5e98584543886522c24734df8bf01aab28096b82add5391047c40084a1ab0c2eccd96c2f6cadca8eff7d4cac545b56c48777f56e9b7d0d54bb2bdb

  • memory/396-56-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-26-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-19-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/396-21-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/396-55-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-54-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-36-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-20-0x0000000002DB0000-0x0000000002E5A000-memory.dmp

    Filesize

    680KB

  • memory/396-22-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-53-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-24-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-47-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-51-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-81-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-80-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-79-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-78-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-77-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-76-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-75-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-74-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-73-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-72-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-70-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-69-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-67-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-65-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-64-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-62-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-61-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-60-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-58-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-57-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-18-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/396-27-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-40-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-14-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/396-52-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-50-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-49-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-48-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-46-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-45-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-44-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-43-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-42-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-41-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-39-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-38-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-37-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-35-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-34-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-32-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-33-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-31-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-30-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-29-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-28-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-71-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-68-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-66-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-63-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/396-59-0x0000000002FA0000-0x0000000003057000-memory.dmp

    Filesize

    732KB

  • memory/1008-1-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/1008-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1008-0-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/1008-17-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1008-16-0x0000000002220000-0x0000000002272000-memory.dmp

    Filesize

    328KB

  • memory/1008-15-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB