Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 11:18

General

  • Target

    a1f61f346d6f8856bc883dbf9768a1f6d3c22a1408ad201db06c8518e28d482a.exe

  • Size

    213KB

  • MD5

    a34f70bb2344fd02b9d99a907653b97a

  • SHA1

    9cb57b47b31c66467bcb53b2ba0997a3d7830df3

  • SHA256

    a1f61f346d6f8856bc883dbf9768a1f6d3c22a1408ad201db06c8518e28d482a

  • SHA512

    07f8f374431528dd56c948e3c1eb944dc34da13ccb8b2474b955114ce6f8bad9cc6a54ca0a89a8dd2716420817dc409d3f33c7b2bd8b1746add7edb81a8e024f

  • SSDEEP

    6144:8QfbXnEreyARNf+fIfvEEDi3EJ3FzbPotDy6:rXkej+f4VDOEVdbgtf

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1f61f346d6f8856bc883dbf9768a1f6d3c22a1408ad201db06c8518e28d482a.exe
    "C:\Users\Admin\AppData\Local\Temp\a1f61f346d6f8856bc883dbf9768a1f6d3c22a1408ad201db06c8518e28d482a.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8A2B.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\8A2B.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\9867.tmp

    Filesize

    61KB

    MD5

    4a43abc387c18de26afdda41202e0745

    SHA1

    e0ecc37cddb3b46d7158d072351bb3f4555834f0

    SHA256

    f6344c21b54efbd440e9f1d4d8a23465cdaca9fd8e1aca64b7844289a592abaf

    SHA512

    935a0d12f55437d17ded0cd05fe8de1c44aaa05097ef844c54d332f1b9bfb1d815fc1d2f79e2a8590d28e0656f600c2362c9cedeaab4b9cb72b946aba7c2de94

  • C:\Users\Admin\AppData\Local\Temp\993A.tmp

    Filesize

    42KB

    MD5

    59d956c922262b10c3a02c43909f31de

    SHA1

    f0550423e3dd6436d8923023caf762d6656ae2aa

    SHA256

    7c31599de505ad27174054b463d0dd3a6609b98a7094ea9f67d17b2828259dfe

    SHA512

    e0f72f9dd961fd92715dc52951ed0b21e18266dc83d92262952f32cc006eaffc186b1d651b136706a4719ccb3728b80d493270a184bb7603233fc5ccff5c545e

  • C:\Users\Admin\AppData\Local\Temp\993A.tmp

    Filesize

    42KB

    MD5

    7d9938145128fe640756ead280a34d0f

    SHA1

    a999f76c57d8864d093e0a341a0971386d743728

    SHA256

    5f2c23d782904f9896dbe3c51e36c400a5a05490260a148b3ac9556aa307fec8

    SHA512

    a0ff73aaf10c6630970c116c8cf8800e2bcc2c211f37b96a0303621e289cce31c5a1b47452eb83f26d649e2041754054f56a8686dfa01f4fbffa69921031497e

  • C:\Windows\apppatch\svchost.exe

    Filesize

    213KB

    MD5

    0519cd76eb9cde0e050db75cca68c378

    SHA1

    5190be43014725e6f1db7432b3e88af904e30be1

    SHA256

    3927d11cde8625f637cb091c5cac3773c367eda728d4543f59d67cea69a31dab

    SHA512

    f26f6d6b55e7f303897f593d6f27a37670664352877999df19c4662e439f3b23dad02c4a5a49eebc23ece344178580d1205baf4fa7bcda72070152eb89edfffa

  • memory/932-0-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/932-1-0x00000000023E0000-0x0000000002431000-memory.dmp

    Filesize

    324KB

  • memory/932-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/932-14-0x00000000023E0000-0x0000000002431000-memory.dmp

    Filesize

    324KB

  • memory/932-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/932-12-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3004-61-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-54-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-19-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3004-20-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-24-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-22-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-25-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-33-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-72-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-79-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-78-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-77-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-76-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-75-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-74-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-71-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-70-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-69-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-68-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-66-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-65-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-64-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-63-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-62-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-17-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3004-60-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-59-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-58-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-57-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-56-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-55-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-18-0x0000000003000000-0x00000000030A8000-memory.dmp

    Filesize

    672KB

  • memory/3004-53-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-52-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-51-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-50-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-49-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-48-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-47-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-46-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-45-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-44-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-43-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-42-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-41-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-40-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-38-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-36-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-35-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-34-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-73-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-32-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-67-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-31-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-30-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-29-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-28-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-27-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-16-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3004-13-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3004-26-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-39-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB

  • memory/3004-37-0x00000000031B0000-0x0000000003266000-memory.dmp

    Filesize

    728KB