Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 06:49

General

  • Target

    5ad882dafd206b348c5872e22b9846793cd0b27c80e91bf46682ea31c537dd16N.exe

  • Size

    205KB

  • MD5

    070e98c44b9c69bb6cf0f9817f912f70

  • SHA1

    dee599b63acf7b5a21c72b2953ba94923aecd2c7

  • SHA256

    5ad882dafd206b348c5872e22b9846793cd0b27c80e91bf46682ea31c537dd16

  • SHA512

    8766a8382de6eba8134fd8c2e8436678df279395c693b5af268d0bbf906e5fa03340d4086f03f127271f390745040975db2e9d0d2ff15036e464d1f91e6b695e

  • SSDEEP

    3072:67VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:gzHnMLm5GNGxHUhtnkdpHqTKzhh8i

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ad882dafd206b348c5872e22b9846793cd0b27c80e91bf46682ea31c537dd16N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ad882dafd206b348c5872e22b9846793cd0b27c80e91bf46682ea31c537dd16N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    8fff06f9f24e516941c6b255b44f81e1

    SHA1

    06873b7d7974d5ca70ae98e9682ca3825d9a2491

    SHA256

    34afb2d382ebc8b6b5ebc6f7266e0390d4d0e808526125c9cfc52f044324c62f

    SHA512

    cc2efa3fbb50eea805af2c5ada6830f1ed8f52799b1cbeed2c14131f8f613a34521c9032d95e51e3e14bc12f2d2946d5ab9c43840d01611985484499eee2ec1d

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    81074f9418de05705154a80f86bfeb60

    SHA1

    b0fd8d1eeda7fc84d99280380b42becd8ae3c742

    SHA256

    d3d7101ca3b193767dae6a9664b4bb87290868509c3e861e66dd6313eefe32b9

    SHA512

    6a0d3bff824b82284102aedc96769e3e48b8e772e0275c6a7013e90f64a4110f24051fb0f6611ed16109d6533ac4b945d4e4160e8ab67039e6c5accc3b9c7a19

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    12KB

    MD5

    caa300673c11a7627a7b6346e1a93b61

    SHA1

    7ecaf36f1e150c478b6cfc3446ec7f0c662c071a

    SHA256

    42ae110a0ecd0d83c4f12314d42a585354b501856dc3c7b483123fcbc317f2aa

    SHA512

    f11f1182d2fdc14b2c64e2221091e318f76c9a41824977c1a93bf2077300bba919ca4a01c80340c4c20d239ac6dbadf091f544891f0ec72df62a6cc11231faa6

  • C:\Program Files (x86)\Windows Defender\puzylyp.com

    Filesize

    61KB

    MD5

    0890ff6688fafb7db8202ad68a7acb16

    SHA1

    ded5c9b3bdc61a1abce69c447bbed072a49f02fe

    SHA256

    79539a872a2c6cabe8face522ea4413dcb34802a2fd9a847045d0f3d8a4bfaff

    SHA512

    c0564b0babeb263e61e51e3f59bc3ea2fa69b64548a45a5b7dc5d1d2aa258792fa6cf76f3a5cc8331463eda66276990b1af150d9d8767378f56bb1ae7f4a4a5b

  • C:\Program Files (x86)\Windows Defender\qetyhyg.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\login[5].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Windows\apppatch\svchost.exe

    Filesize

    205KB

    MD5

    ba2a169108f5b3f9566c100fb884a175

    SHA1

    b51cc829500fad6a6cb1b853e81ac979f54e4932

    SHA256

    23778af1b0ef294d33c1a745839fe12aa8271d7190815e694f6b58009056b390

    SHA512

    a8525e2a763a6c7eddb7306639d3a633b6ef30df4e8191cb886bde82d5472ee01c15def527b8ea838c4f17271a4948f4c8aae77e24ef063b60709b4ff1bc8572

  • memory/2124-52-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-78-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-24-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-22-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-27-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-47-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-77-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-76-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-75-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-45-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-73-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-72-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-71-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-70-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-69-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-68-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-67-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-66-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-65-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-64-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-62-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-61-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-60-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-59-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-58-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-57-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-56-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-55-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-54-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-53-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2124-51-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-50-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-49-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-13-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2124-20-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-74-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-44-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-43-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-42-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-41-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-40-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-39-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-38-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-37-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-36-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-35-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-34-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-33-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-32-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-31-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-30-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-28-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-26-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-25-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-79-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-63-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-46-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-29-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-48-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/2124-16-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2124-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2124-18-0x0000000002DD0000-0x0000000002E74000-memory.dmp

    Filesize

    656KB

  • memory/2740-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2740-1-0x0000000002220000-0x000000000226F000-memory.dmp

    Filesize

    316KB

  • memory/2740-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2740-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2740-14-0x0000000002220000-0x000000000226F000-memory.dmp

    Filesize

    316KB

  • memory/2740-12-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB