Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 04:02

General

  • Target

    8e21cab3b1a4e991f7e6dd85d94fb7d999f0ed07475e66633bd48c6aa2f4cdb0N.exe

  • Size

    227KB

  • MD5

    2484e861bd23efa2364ff1427ae748c0

  • SHA1

    75e51f78af165260a12840b0bcbc1bffc2a2b25d

  • SHA256

    8e21cab3b1a4e991f7e6dd85d94fb7d999f0ed07475e66633bd48c6aa2f4cdb0

  • SHA512

    1ffe04467b202171b2bed08de61eda9149f264fec130e11fcfb26e139ba323198b9e9f4fa6cb2923e00ca60ca127215c903d38eb3d0883740fb1a5039dc7963a

  • SSDEEP

    6144:1UcxlKhSGoqTecGy9+hAu7//QnSrMhcZEpX:1V8hbTiyqA4QnSQhcZ8X

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e21cab3b1a4e991f7e6dd85d94fb7d999f0ed07475e66633bd48c6aa2f4cdb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e21cab3b1a4e991f7e6dd85d94fb7d999f0ed07475e66633bd48c6aa2f4cdb0N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    227KB

    MD5

    12e6849210d62dad0063f212fe8c4d2b

    SHA1

    5eea9d08468248a1d7590411292e5e1427621e68

    SHA256

    8aebd2472fcc06888783df46e36d32f7485d41de0e5111d24e1237ff2a81e300

    SHA512

    b069cfbd0557276e11658aeed71d6abd8e8696ea3574d2133785ec718b0cbdc9ca58e049206c9bde0736e7b3a98df182ca242747edf9af61041bb958799be3f7

  • memory/3400-58-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-19-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/3400-20-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/3400-59-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-28-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-13-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/3400-32-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-22-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/3400-23-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-27-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-25-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-36-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-42-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-84-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-82-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-81-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-80-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-79-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-78-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-76-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-75-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-74-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-72-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-71-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-70-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-69-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-68-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-67-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-66-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-65-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-64-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-63-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-62-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-60-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-21-0x0000000002A00000-0x0000000002AAA000-memory.dmp

    Filesize

    680KB

  • memory/3400-51-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-57-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-56-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-55-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-54-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-53-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-52-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-50-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-48-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-49-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-47-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-46-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-45-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-44-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-41-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-43-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-40-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-39-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-38-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-37-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-35-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-34-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-33-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-30-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-31-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-29-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-83-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-77-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-73-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/3400-61-0x0000000002BB0000-0x0000000002C67000-memory.dmp

    Filesize

    732KB

  • memory/4868-1-0x00000000005E0000-0x00000000005E3000-memory.dmp

    Filesize

    12KB

  • memory/4868-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4868-0-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4868-18-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4868-17-0x00000000005E0000-0x00000000005E3000-memory.dmp

    Filesize

    12KB

  • memory/4868-16-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB