Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 06:57

General

  • Target

    89ac391b6f5c735bbe010db7edfc967e10f61d155b3008ca957049d348d1a6fa.exe

  • Size

    355KB

  • MD5

    56d2e929d216372ca68c320a2cd90129

  • SHA1

    493eda1a437c54df5209c4ce7f2fe79541b247a1

  • SHA256

    89ac391b6f5c735bbe010db7edfc967e10f61d155b3008ca957049d348d1a6fa

  • SHA512

    960b5e8a8ab9d1f377d709ef0d0abbf0936ed3e054555507bf911d8a1bdb3ecca70c0d35b3d8769d8b93200f584a3e759cc80edb36d9f6642a370bf1956d7613

  • SSDEEP

    6144:9gEmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei9:7mWhND9yJz+b1FcMLmp2ATTSsd9

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89ac391b6f5c735bbe010db7edfc967e10f61d155b3008ca957049d348d1a6fa.exe
    "C:\Users\Admin\AppData\Local\Temp\89ac391b6f5c735bbe010db7edfc967e10f61d155b3008ca957049d348d1a6fa.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6IJLDY7V\login[2].htm

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\login[1].htm

    Filesize

    42KB

    MD5

    9a533bda2237ec534d9a5127af2702d0

    SHA1

    58bd1b1c6f7e44e8e44578ac5b7decd1cb7b8715

    SHA256

    c4cc8adebec5717af0b118e092a7608b96bf1b17d8c64a3b6d2cc4c5fa43b4dc

    SHA512

    a312e747adaf35151e2d1689e772803c5341d823d5e9873221bd10c93a11ce19457a2e761d2ef91dd442601f3fa7e30a8a4a5b764e572d340174e08eb57be1f0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\login[5].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\BDE0.tmp

    Filesize

    12KB

    MD5

    e1f035b24ce0e8137682b703d19315b5

    SHA1

    18712fd6ad888c146237d187332ccc904ff1f032

    SHA256

    117ea4f0f411e1aaeab307c087a57678abcba7e6aa96a5bd1f2d5d7026d453a0

    SHA512

    17a428fcea9d064e8318f0ef30da88c713209f5d591d2a4e9725d56663acdb96996569693804071aea17ddc793eade219409c4548e48d1ddc8814662236bae7d

  • C:\Users\Admin\AppData\Local\Temp\BDE0.tmp

    Filesize

    12KB

    MD5

    caa300673c11a7627a7b6346e1a93b61

    SHA1

    7ecaf36f1e150c478b6cfc3446ec7f0c662c071a

    SHA256

    42ae110a0ecd0d83c4f12314d42a585354b501856dc3c7b483123fcbc317f2aa

    SHA512

    f11f1182d2fdc14b2c64e2221091e318f76c9a41824977c1a93bf2077300bba919ca4a01c80340c4c20d239ac6dbadf091f544891f0ec72df62a6cc11231faa6

  • C:\Users\Admin\AppData\Local\Temp\CE2A.tmp

    Filesize

    61KB

    MD5

    e88e905f2616b49fac6ad13dbab0c4f6

    SHA1

    f534ba633e65a62892730840f1f5188512ab528c

    SHA256

    65240f24dccd7dc5e1ff1855b667f41bcb5eedca45f8ddee3f455944495c37a9

    SHA512

    d12a9bdc0e3f76b08f5ecba5dfc3cd3f28c885640fb56f97fb5651411ffcd045dc544c1c5eedabb220a4c24b6d1f175c69d49c6e1ff924b4a6c17f7902fea5da

  • C:\Users\Admin\AppData\Local\Temp\F78.tmp

    Filesize

    61KB

    MD5

    2eba46564e304dd77758063964fb5e3a

    SHA1

    b528fe466bfec7457ffe1f0f38bc086c8528e4d9

    SHA256

    87ef5613b2e979930e8ed3432884f00a6df337a42369299fdc373f2c5bde0eb5

    SHA512

    45e6bf78746f6f8c73679af4dc74ddba9ea040529167dc27542049b83f5d5dc13ef73d99238f441f1af119e425637ade086a37228a5dbd6b192f75e437fcb6ce

  • C:\Users\Admin\AppData\Local\Temp\FAD5.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\FAED.tmp

    Filesize

    24KB

    MD5

    a92fb16528dd48b35cf900e0ba0808ab

    SHA1

    d3916c19db3c64a3be66f59d332d91f8ff75797f

    SHA256

    2af0b43991ada0f6a2227aa548ea29c71d46891f4d731ae24ff10be36ccc4619

    SHA512

    19bd68f97025abf78bb5c859aa4c5b820f245fc14542acb29480f509433ad138927a34ddd2826a85f72adc757c35ef62aa3343be41b213c13db1e4a3aa7b4784

  • C:\Users\Admin\AppData\Local\Temp\FBDC.tmp

    Filesize

    42KB

    MD5

    b745790516ee85a18cfdbb3db87991e5

    SHA1

    b7b1299a953a76fa3e756899ad60466fe349a819

    SHA256

    78b0b3c483f0385b6a450bf492e6e7f74e2d48cb753e9ac03a00ee4a749ec889

    SHA512

    5eb20490e47466e9eec835de83edd6a5326986d1fb80c549e0e618bf8b7781a11793e2d26e27958745ffd9d963e71f24d0b659b0985da31c7d0db2d969c02ebd

  • C:\Windows\apppatch\svchost.exe

    Filesize

    355KB

    MD5

    61f829819279ea8b2b05540502526ba3

    SHA1

    db16ccfb8bda438902c5bf188bd0edb9151f95ba

    SHA256

    4533ac29e90e0a9f28ae41d497fbafa6a2dfb1c959def55f75e09e0923bb54c4

    SHA512

    28dbd2823d7397347ea5440d6f40d5cb41bf7fa982758fde77b4c80efed18043b47ac36df316417384471da481a972b1025e1fb422f2177565a1dc9c1a10fad7

  • memory/1324-44-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-35-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-20-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-71-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-72-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-70-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-68-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-67-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-66-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-64-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-63-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-61-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-60-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-59-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-57-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-56-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-55-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-53-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-52-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-50-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-49-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-48-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-47-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-46-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-45-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-69-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-42-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-41-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-40-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-38-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-37-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-65-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-34-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-33-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-31-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-30-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-29-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-28-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-27-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-26-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-25-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-24-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-22-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-73-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-62-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-58-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-19-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-54-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-51-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-18-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-43-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-39-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-36-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-32-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-21-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-17-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-13-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-16-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-14-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-10-0x00000000030B0000-0x0000000003158000-memory.dmp

    Filesize

    672KB

  • memory/1324-23-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/1324-174-0x0000000003500000-0x00000000035B6000-memory.dmp

    Filesize

    728KB

  • memory/3764-8-0x0000000000430000-0x000000000048F000-memory.dmp

    Filesize

    380KB