Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2025, 17:22

General

  • Target

    040f054e1ace3c790e2a985512d91a35e1f2f2c03bdab7885ce6ae043c447158.exe

  • Size

    204KB

  • MD5

    83f50c5bf7873b254262f395b63e43c6

  • SHA1

    506c2ee9a178e41ff47fd1d7344db0762e24f24a

  • SHA256

    040f054e1ace3c790e2a985512d91a35e1f2f2c03bdab7885ce6ae043c447158

  • SHA512

    78e8ea1a938f30c0bca30ee2fce4a5122fd02e393905175fa753d15a7d7468d67fcb4caabf93cd51df613cec5d7800a953478a4bc7ca98fafbdd197b1142922a

  • SSDEEP

    3072:F5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:FLexkuRaX41xoyJV65gzyZko+uc5

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\040f054e1ace3c790e2a985512d91a35e1f2f2c03bdab7885ce6ae043c447158.exe
    "C:\Users\Admin\AppData\Local\Temp\040f054e1ace3c790e2a985512d91a35e1f2f2c03bdab7885ce6ae043c447158.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1388
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDg3NTk4NDkyIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\59CB.tmp

    Filesize

    42KB

    MD5

    b183ad5a8e72e975feba366f8d443cf7

    SHA1

    212f9f8f9636b4b47b79c6c3ebe56d780e4e6c21

    SHA256

    e30d05fb7b8e8ae6323b4af3dc58b73741c51de6337576a6628aff3aca5fb233

    SHA512

    4bd5722f8cacf9fa6a9e44d853f691a2e28e9d1d95359ac7c8848e432b2a758197f039e44631f643a6155bddbe645931265ed87fbea2e4a32946a3b6b96dd72e

  • C:\Windows\apppatch\svchost.exe

    Filesize

    204KB

    MD5

    1bcb9793626ee3b380760468ac9e08a8

    SHA1

    379ad940bc6441d9ac427c40ec18f9378cc55241

    SHA256

    a80ae419a0a2390cf4c5777139eb7a482e574b486075b8c5f82bc46e00300908

    SHA512

    e1aeb2940b9684dd4e58bb52a3b00421553d86fbdc152dee273ae0ad9819e58004a9a1857d8971bf57e3989628e7b86a1fe95a868eca4ca0c8cd72f34411ef0e

  • memory/728-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/728-1-0x00000000022C0000-0x0000000002311000-memory.dmp

    Filesize

    324KB

  • memory/728-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/728-15-0x00000000022C0000-0x0000000002311000-memory.dmp

    Filesize

    324KB

  • memory/728-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/728-14-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1388-12-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1388-13-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1388-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1388-18-0x0000000002B40000-0x0000000002BE8000-memory.dmp

    Filesize

    672KB

  • memory/1388-19-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1388-20-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-24-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-22-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-64-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-67-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-79-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-78-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-77-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-76-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-75-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-74-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-72-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-71-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-70-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-69-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-68-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-66-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-65-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-63-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-62-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-61-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-60-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-59-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-58-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-57-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-56-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-55-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-54-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-53-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-52-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-51-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-50-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-49-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-47-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-46-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-45-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-44-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-43-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-42-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-41-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-40-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-39-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-38-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-37-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-36-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-35-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-34-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-33-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-32-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-31-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-29-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-28-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-26-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-73-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-48-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-30-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-27-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB

  • memory/1388-25-0x0000000002CF0000-0x0000000002DA6000-memory.dmp

    Filesize

    728KB