Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 15:30

General

  • Target

    384f74f0c44114fdc69c07928ca6a9abe57069ef3a9eee0f60f5ce09cb6b07c3N.exe

  • Size

    205KB

  • MD5

    9571699f0d310015bb88cddd11a26140

  • SHA1

    b1f7f1972f7a1dceb49fd4bb2b59357041148fc8

  • SHA256

    384f74f0c44114fdc69c07928ca6a9abe57069ef3a9eee0f60f5ce09cb6b07c3

  • SHA512

    d117d78f8ba187cca55f0d08ad7ddde422e4903ea0f0d2487a66ad64350f88d9e9f366a269cc35277d6ffc248feffb7d5ab661c2f75f09180785c98ff35d5e3d

  • SSDEEP

    3072:j7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:NzHnMLm5GNGxHUhtnkdpHqTKzhh8i

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\384f74f0c44114fdc69c07928ca6a9abe57069ef3a9eee0f60f5ce09cb6b07c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\384f74f0c44114fdc69c07928ca6a9abe57069ef3a9eee0f60f5ce09cb6b07c3N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\08ZTJJXR\login[2].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Windows\apppatch\svchost.exe

    Filesize

    205KB

    MD5

    34326a68e52aa0304056e4a4ecb2ec3b

    SHA1

    c0dd21b31ecd1819f6525716f32df964f158e5db

    SHA256

    1ed45f56ecb0f191432e52fceecb7420796f2725b698217bc2cc8851a625c27e

    SHA512

    f60d815bd7e73f6b345f8e090e03171c98cf61f39841ea9e338ae0001c171c212c4242cd009f68731eaac452d4b6de99d1851bc82366c955f8102f25f0ce855e

  • memory/3892-43-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-20-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-18-0x0000000002DA0000-0x0000000002E44000-memory.dmp

    Filesize

    656KB

  • memory/3892-39-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-25-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-38-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3892-24-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-22-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-36-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-65-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-67-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-79-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-77-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-78-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-76-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-75-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-73-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-72-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-70-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-69-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-66-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-62-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-60-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-55-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-53-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-52-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-51-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-49-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-47-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-46-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-44-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-13-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3892-41-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-16-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3892-26-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3892-35-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-33-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-31-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-30-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-28-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-74-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-71-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-68-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-64-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-63-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-61-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-58-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-59-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-57-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-56-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-54-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-50-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-48-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-45-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-42-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-40-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-37-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-34-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-32-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-29-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/3892-27-0x0000000002F90000-0x0000000003042000-memory.dmp

    Filesize

    712KB

  • memory/5032-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/5032-1-0x0000000002610000-0x000000000265F000-memory.dmp

    Filesize

    316KB

  • memory/5032-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/5032-12-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/5032-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/5032-14-0x0000000002610000-0x000000000265F000-memory.dmp

    Filesize

    316KB