Analysis

  • max time kernel
    111s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 18:31

General

  • Target

    7428d92765c1917aad7cc856c5b00dcef28ee1ce97e2a106b06a7aa026a94f34.exe

  • Size

    218KB

  • MD5

    c164fea5774a5e7c18e38f9a08bf2e9d

  • SHA1

    3c9552c53df613fc6ee7d22ebe822ed07dcc3e36

  • SHA256

    7428d92765c1917aad7cc856c5b00dcef28ee1ce97e2a106b06a7aa026a94f34

  • SHA512

    8a23d30d8481bd61579e525236e6990b267a5d1f6b83d56d07cd098cbb0aef3f43c8e4cacd14a5e3cecee02dd4f4ad9cd6d2f360083e5b62d2d7351de9fbdbe9

  • SSDEEP

    6144:HEQBDdO1z7L/EIhZDE9oLfFWlMZT7+DGaMwICG:HEGDdQNHEwWlMxYG/wIJ

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7428d92765c1917aad7cc856c5b00dcef28ee1ce97e2a106b06a7aa026a94f34.exe
    "C:\Users\Admin\AppData\Local\Temp\7428d92765c1917aad7cc856c5b00dcef28ee1ce97e2a106b06a7aa026a94f34.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8429.tmp

    Filesize

    61KB

    MD5

    2e9203cca94bb13d72debca5f039c62b

    SHA1

    83ac539603eddcbc016027cc3f5378dae3741cbe

    SHA256

    c9670398211f4c864a2fc8d422d97ec05bcd623dc8cb46d7933aaf995d3bcb7f

    SHA512

    f172c386d8c5633a555158f164e1f612ff65741536ba4b54c1f7fb8e35be891a9c591005a8f58d14b01681404bac646789c5e921595f6545eceedb796d12f75d

  • C:\Windows\apppatch\svchost.exe

    Filesize

    218KB

    MD5

    9f107628bd0dc9c959a1729d1bec742d

    SHA1

    bb01d0181e686851e024b06352de5e1f3a5fedb1

    SHA256

    6d968b43faf66d2360bc39503342f534079f0994230da1f0d61fafd447582487

    SHA512

    fc237947819f42133c003b9a36f6d37f0f30cf71697adab27b4aece063e3f3c3cef1301b98fdbab15dad965a32eca491a6fa41281e98d0d613a0dbd19cb01645

  • memory/3008-58-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-24-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-18-0x0000000002C00000-0x0000000002CA8000-memory.dmp

    Filesize

    672KB

  • memory/3008-15-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3008-56-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-55-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-43-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-19-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3008-20-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-54-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-22-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-53-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-61-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-79-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-78-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-77-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-76-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-75-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-74-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-73-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-72-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-71-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-69-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-68-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-67-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-66-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-65-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-64-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-63-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-62-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-60-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-59-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-16-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3008-57-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-30-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-47-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-17-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3008-52-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-51-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-50-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-49-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-48-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-45-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-46-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-44-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-42-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-41-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-40-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-39-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-38-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-37-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-36-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-35-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-34-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-33-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-32-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-31-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-29-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-28-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-27-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-26-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-70-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3008-25-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3536-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3536-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3536-1-0x0000000000880000-0x00000000008D1000-memory.dmp

    Filesize

    324KB

  • memory/3536-0-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3536-13-0x0000000000880000-0x00000000008D1000-memory.dmp

    Filesize

    324KB

  • memory/3536-11-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB