Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 11:19

General

  • Target

    89f373eafae2afbed2b21014debb8d015f45b539d0a735dd6895fa778cdad90eN.exe

  • Size

    201KB

  • MD5

    0591cb0883c388f444504ac7a22660d0

  • SHA1

    dd45645d3f10b008110d8cadedde254f275ea705

  • SHA256

    89f373eafae2afbed2b21014debb8d015f45b539d0a735dd6895fa778cdad90e

  • SHA512

    392e808703861b82c9dbf233d8eb0eed2c8010b837bd6985f4c5bd325c586cb7f88cbe5ca65c55408afb97d09bb8b5c3d2c9788a61d3254a4fb328f45a3a1563

  • SSDEEP

    6144:Bt++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:e+cff22qZhZcKYhc/

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89f373eafae2afbed2b21014debb8d015f45b539d0a735dd6895fa778cdad90eN.exe
    "C:\Users\Admin\AppData\Local\Temp\89f373eafae2afbed2b21014debb8d015f45b539d0a735dd6895fa778cdad90eN.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Windows Defender\galynuh.com

          Filesize

          593B

          MD5

          926512864979bc27cf187f1de3f57aff

          SHA1

          acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

          SHA256

          b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

          SHA512

          f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

        • C:\Program Files (x86)\Windows Defender\qexyhuv.com

          Filesize

          114B

          MD5

          bfde1e9e9c32c1681a16139450c6909d

          SHA1

          7e669b927e6a75a10a0ca29e38e58ddcb49b725e

          SHA256

          e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

          SHA512

          781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\login[2].htm

          Filesize

          168B

          MD5

          d57e3a550060f85d44a175139ea23021

          SHA1

          2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

          SHA256

          43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

          SHA512

          0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

        • \Windows\AppPatch\svchost.exe

          Filesize

          201KB

          MD5

          568280fad6909e99f8108fbc1766a0b7

          SHA1

          a0f4dac6ff398fa9067d138aad014f7bd61e06f5

          SHA256

          4151aa78a37c59b819719f82d8ecda36c4fa21fadd962a078efe23a09b617870

          SHA512

          74ed21dc617baef0c14c3b990953c5ac0f282213c17cc32314e168529bf2fa7c7e2ee50f849af34d39515033245fba0d5c72f418dd83719a421fac40bcc77683

        • memory/1452-68-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-83-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-19-0x0000000000400000-0x0000000000491000-memory.dmp

          Filesize

          580KB

        • memory/1452-20-0x0000000000400000-0x0000000000491000-memory.dmp

          Filesize

          580KB

        • memory/1452-29-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-32-0x0000000000400000-0x0000000000491000-memory.dmp

          Filesize

          580KB

        • memory/1452-25-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-23-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-21-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-33-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-34-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-37-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-43-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-47-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-79-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-64-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-82-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-81-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-80-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-78-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-77-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-76-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-74-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-73-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-72-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-71-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-70-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-69-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-31-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-67-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-27-0x0000000001D60000-0x0000000001E04000-memory.dmp

          Filesize

          656KB

        • memory/1452-62-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-66-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-63-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-65-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-60-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-59-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-58-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-57-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-56-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-55-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-54-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-53-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-52-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-50-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-49-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-48-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-46-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-75-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-45-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-44-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-42-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-61-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-41-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-40-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-51-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/1452-39-0x0000000002350000-0x0000000002402000-memory.dmp

          Filesize

          712KB

        • memory/2980-1-0x00000000002A0000-0x00000000002EF000-memory.dmp

          Filesize

          316KB

        • memory/2980-2-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/2980-0-0x0000000000400000-0x0000000000491000-memory.dmp

          Filesize

          580KB

        • memory/2980-18-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/2980-17-0x00000000002A0000-0x00000000002EF000-memory.dmp

          Filesize

          316KB

        • memory/2980-16-0x0000000000400000-0x0000000000491000-memory.dmp

          Filesize

          580KB