Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 06:28

General

  • Target

    ad857f6c3ddcec462a918e4cbda2982493d17d774b6a439b4f7e45854076c600.exe

  • Size

    208KB

  • MD5

    f9f19f161feb6743dd7059b71c53982b

  • SHA1

    559d105c04102403aba5112ba3c05e9b653f75c4

  • SHA256

    ad857f6c3ddcec462a918e4cbda2982493d17d774b6a439b4f7e45854076c600

  • SHA512

    6d0dc5e85654ecf2fcbab25c234c2e95ae4a35c498270bb47de9f0291ebcefa55693a7bde64b7abd84d0d5e057a018904c117405bb230b1534211e9ab4d612fb

  • SSDEEP

    6144:QZWia9ubuBsyGvMwlvaB8Mi5vz9IGePA+hq56:equCuygMQjd5vJIBP1p

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad857f6c3ddcec462a918e4cbda2982493d17d774b6a439b4f7e45854076c600.exe
    "C:\Users\Admin\AppData\Local\Temp\ad857f6c3ddcec462a918e4cbda2982493d17d774b6a439b4f7e45854076c600.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Low\IE\OSD3T3DD\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    9cfcfcc3028141b85adfe4497d5dfbcf

    SHA1

    4b3b03d78adcb24b80420e382958ddb19b2bef8f

    SHA256

    5e539db94578bd62809e3c2b1b1d8cd1e852dc25558dd125688eaab9d73a6bb1

    SHA512

    1b5138d5376bfcfe99831bc30111d1c3b9e36f1e3e1c190f0fa7451072676351ca30dbba4ca7143234a06f10405b60b0771a8f743e83150cf6cbacf2ad2df8a2

  • memory/1780-60-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-26-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-20-0x0000000002A40000-0x0000000002AEA000-memory.dmp

    Filesize

    680KB

  • memory/1780-14-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1780-58-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-57-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-39-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-21-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1780-22-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-56-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-24-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-49-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-53-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-81-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-80-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-79-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-78-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-77-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-76-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-75-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-74-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-73-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-72-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-71-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-70-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-69-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-67-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-66-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-65-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-64-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-63-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-62-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-15-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1780-59-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-27-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-45-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-19-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/1780-55-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-54-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-52-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-51-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-50-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-48-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-47-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-46-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-44-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-43-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-42-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-41-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-40-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-37-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-38-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-36-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-35-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-34-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-33-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-32-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-31-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-30-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-29-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-28-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-68-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/1780-61-0x0000000002BF0000-0x0000000002CA7000-memory.dmp

    Filesize

    732KB

  • memory/4544-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4544-16-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4544-1-0x00000000021D0000-0x0000000002222000-memory.dmp

    Filesize

    328KB

  • memory/4544-0-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/4544-18-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4544-17-0x00000000021D0000-0x0000000002222000-memory.dmp

    Filesize

    328KB