Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 08:13

General

  • Target

    9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe

  • Size

    282KB

  • MD5

    635bb56353d749a3f4b9067ee3af53b6

  • SHA1

    ef3188a9c3fa65e2fd1d1dfb9051adabbcc2a50b

  • SHA256

    9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581

  • SHA512

    e5168bc052bdd1ca736d8eaf1e75c4298a384520a97a80c44d26b99d24ac21efbd2cb26bd4fbda04789c91edf6feedcedd747e64f99b99932bc8afa5adb2bc0e

  • SSDEEP

    6144:XZw2TxWX/f48zO7gtwua+Japo5iCb8lseuxw/6YF10:JFTxWYMh5qoLb8LCy9c

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe
    "C:\Users\Admin\AppData\Local\Temp\9b85f96f09f71227797fba0ed73051bdefccf6bd3a029a06ec7aec552da26581.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1456
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA5ODc4ODA3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2564
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3600
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6732f6a68,0x7ff6732f6a74,0x7ff6732f6a80
        3⤵
        • Executes dropped EXE
        PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{29ED6721-2738-4FEF-A53C-E50E701CD414}\EDGEMITMP_0BD0B.tmp\setup.exe

    Filesize

    6.8MB

    MD5

    bdb1aecedc15fc82a63083452dad45c2

    SHA1

    a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb

    SHA256

    4ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f

    SHA512

    50909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d

  • memory/1456-0-0x0000000000400000-0x000000000062D000-memory.dmp

    Filesize

    2.2MB

  • memory/1456-1-0x0000000000BC0000-0x0000000000C0A000-memory.dmp

    Filesize

    296KB

  • memory/1456-2-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1456-3-0x0000000000C10000-0x0000000000C11000-memory.dmp

    Filesize

    4KB

  • memory/1456-4-0x0000000002420000-0x00000000024D2000-memory.dmp

    Filesize

    712KB

  • memory/1456-5-0x0000000000400000-0x000000000062D000-memory.dmp

    Filesize

    2.2MB

  • memory/1456-6-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-8-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-10-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-69-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-70-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-112-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-110-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-109-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-108-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-107-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-105-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-106-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-104-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-103-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-102-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-100-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-101-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-99-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-98-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-97-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-96-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-95-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-94-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-92-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-90-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-89-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-88-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-87-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-85-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-84-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-81-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-79-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-78-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-77-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-76-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-75-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-74-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-71-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-68-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-67-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-66-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-64-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-63-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-61-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-60-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-111-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-91-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-93-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-86-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-83-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-82-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-80-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-58-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-73-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-72-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-65-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-62-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-59-0x0000000002A80000-0x0000000002B38000-memory.dmp

    Filesize

    736KB

  • memory/1456-124-0x0000000000BC0000-0x0000000000C0A000-memory.dmp

    Filesize

    296KB

  • memory/1456-126-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB