Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 10:24

General

  • Target

    b03541d2da5e5e2a5b173ea59a943db6a7ceb71fadb3a6a8e3ecd2e62f5ed43bN.exe

  • Size

    213KB

  • MD5

    ab3c3723c6a5f0eb3920e00262af32c0

  • SHA1

    8942a6517d824795fb6d7704342e5de6d851773f

  • SHA256

    b03541d2da5e5e2a5b173ea59a943db6a7ceb71fadb3a6a8e3ecd2e62f5ed43b

  • SHA512

    e38faf31b0d849502c0818d5b3be0acbac3f281eca21002dda874e1828531503bbfcd6211350d4726f83e84bd9c895ca668f10d05da6d437d27e6fa96e0a5192

  • SSDEEP

    6144:l7++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:I+cff22qZhZcKYhc/

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b03541d2da5e5e2a5b173ea59a943db6a7ceb71fadb3a6a8e3ecd2e62f5ed43bN.exe
    "C:\Users\Admin\AppData\Local\Temp\b03541d2da5e5e2a5b173ea59a943db6a7ceb71fadb3a6a8e3ecd2e62f5ed43bN.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    126e6196041976e38d78d9d2985ce67d

    SHA1

    d7a5e0b8d99989dbe90778de35c05514b5eb23cc

    SHA256

    26012646a7adabb7a9be39c637892423c58597265e850e51a7c1280c869d3ef1

    SHA512

    6e3330df09fb082f91491e4b164fe7e4f6a83b4e013ac2441779a5f07975face759caa3ac519b6867e47e2e1f7841e25371c381f7dd6750dff64ea26c7adc78c

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    56879050b99f363449abb35c3a06a615

    SHA1

    39661f77b9e7af19de769223ac81189f0215e0e2

    SHA256

    1ae67895705462f21b05ce7fc9d8231619c853614d807dcb255892b7e59b38ec

    SHA512

    21dc703276eaae5d6d8488f68f3ae3e345ce6cfee3337b42c81611a2d50a19480434dcfc46953e614669226e2a94fce30f67fbab297732c8df7bd7a6a8ba8f54

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    41d80e547ed64ba3a564b82bfd39c21f

    SHA1

    27a6d619012e629825c2764644b6cf226d2ecff7

    SHA256

    99d5cb8958cc7d833ca6e845be426f2e7dc2470f2a4dc8b0f88e56e2a63f09b3

    SHA512

    451c6480e5c3b47f682d1e5dbba40f1018dc690564583f8fd7ed623f7afa6b5f3d4aa8efea2257e19e46fad92871084b7ca68c63799c394ae19e9a0254991093

  • C:\Program Files (x86)\Windows Defender\qexyhuv.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    213KB

    MD5

    33000748aa98a986659a48e6365f31b9

    SHA1

    cad45207f0d53a16d93ecf91bc4ab3af46a80455

    SHA256

    89efa01a447566bd6cba2d53f747a6f9ede95b2fe0cf1e3a5f2b85fde23f5aa4

    SHA512

    43bf91ebfda75944cd93259c17bb2db100883d674318bdae231902e736d7a793d11f7fa655fe62e061fe3b3d8d19c6901434a3b877f9cfd57485ce55f9223730

  • memory/2028-76-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-59-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-24-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2028-23-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2028-25-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2028-34-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-48-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-36-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-37-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2028-32-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-30-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-28-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-26-0x0000000002290000-0x0000000002334000-memory.dmp

    Filesize

    656KB

  • memory/2028-38-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-40-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-42-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-44-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-70-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-72-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-88-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-87-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-86-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-84-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-83-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-82-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-81-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-80-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-79-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-78-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-77-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-57-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-75-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-71-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-69-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-73-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-68-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-67-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-66-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-65-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-74-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-64-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-63-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-62-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-61-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-60-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-58-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-56-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-55-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-54-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-53-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-52-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-51-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-50-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-49-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-47-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-85-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-46-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2028-45-0x0000000002440000-0x00000000024F2000-memory.dmp

    Filesize

    712KB

  • memory/2128-1-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2128-2-0x0000000001C80000-0x0000000001CCF000-memory.dmp

    Filesize

    316KB

  • memory/2128-0-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2128-19-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2128-20-0x0000000001C80000-0x0000000001CCF000-memory.dmp

    Filesize

    316KB

  • memory/2128-22-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2128-16-0x00000000022B0000-0x0000000002344000-memory.dmp

    Filesize

    592KB

  • memory/2128-3-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2128-18-0x00000000022B0000-0x0000000002344000-memory.dmp

    Filesize

    592KB