Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2024, 20:25

General

  • Target

    203100dffe14333162faeaee7a57b6ac484ee4b03351811921a03471d4ab78be.exe

  • Size

    208KB

  • MD5

    f79a440a4ab6cfde3b3c8fead393f146

  • SHA1

    38c0d4d5048bba72c82beb4717847ad53a014b98

  • SHA256

    203100dffe14333162faeaee7a57b6ac484ee4b03351811921a03471d4ab78be

  • SHA512

    7636d87587666ad3d702f67d708063f7e4b16eee1b6e7946892967b8bbe632551032c20b7d56edb36e5790f30e52f3576046c5853df0f22784e717d78326945a

  • SSDEEP

    6144:vOYX27lPBA3YDMw4lj6idlMlwl7/79C87:vwBAy0rlMI5

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203100dffe14333162faeaee7a57b6ac484ee4b03351811921a03471d4ab78be.exe
    "C:\Users\Admin\AppData\Local\Temp\203100dffe14333162faeaee7a57b6ac484ee4b03351811921a03471d4ab78be.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\436B.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\439B.tmp

    Filesize

    1KB

    MD5

    cdc3350868c4d9bcb27c16e24d9b43d5

    SHA1

    21827d06d7ae5891bcdbfbaf385fe3132ea44991

    SHA256

    f99954d967b01c2348139f5e48e28158569c5f72e45e5c350149a5777f62cdaf

    SHA512

    a338cad1b6ab52e2286cdf89cd1998f7dc5e5682cbc3f735e08c6d12bd1020cd4636dc5386d1ee58e20d4460cf3057066e30f921a4e56fef66c18805c804752e

  • C:\Users\Admin\AppData\Local\Temp\9ADD.tmp

    Filesize

    24KB

    MD5

    ea56b80947a964ab16afca2f2b3c40c5

    SHA1

    7cdd22d544d48b6bb0d7e03443b1e85a1b44f903

    SHA256

    e3e514fddbea8bda457ca5a9ec4564cd75a72441171f398333894aeb067fe223

    SHA512

    2ca40d0d561533bfd0a13f0101f011c2dfca21508f83d9e17178c73388a4f8b3aff29b6c17587d275c2aa5f37eab84ec6eefaf59f5c6b8b7227a8a3b942f1ece

  • C:\Users\Admin\AppData\Local\Temp\9AF0.tmp

    Filesize

    481B

    MD5

    48557ceb18a79faa7ed5038232f92be7

    SHA1

    9ba0b8f846f4a6f609ff814afd67336c44a7e3a4

    SHA256

    2999de9abbb9cf9b64da946305585ef7aafe83cf2556a6fcf194297e1965f336

    SHA512

    6955726cc05aa5f308c9a4700df9a5d8cf7dc6b6296898c310ff7f39ac49df62641556ebb5627d73abb2f1d73162926ab65e2899f215881279312b87a9e15067

  • C:\Users\Admin\AppData\Local\Temp\9B42.tmp

    Filesize

    42KB

    MD5

    0e1bc0cbefd2410491894cfd892ccfcf

    SHA1

    c64d374fb7f026f1c143ab781409045f874ae679

    SHA256

    d5419ba2f6c2985dbfa1571c91c30f146357c502db4585c8d94fa411133f00ba

    SHA512

    08a2de6a84e40a5f1232604ed5091682ba3001291fc0ad7f3abedf08b44b1e75649bfc913af656dc0162ae048c3a1bfab9815b79b2fd449b302b46f5322506ed

  • \Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    49fcee7a204430faad086c633c472765

    SHA1

    298757dff1fb5eae76da2232c498157aa3514c14

    SHA256

    b8137fe04482339c9c11191efb710e833161c0a176bab342a1002c63a3154709

    SHA512

    e15af6d4119509c5e12bff81244192e395610f51b717553b8358908ffab959b939250e1cab4715e4ea3ab7b9ebaa512505152b7d2b0728be2bab18c05a6e975e

  • memory/2004-1-0x0000000000230000-0x0000000000281000-memory.dmp

    Filesize

    324KB

  • memory/2004-0-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/2004-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2004-18-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2004-17-0x0000000000230000-0x0000000000281000-memory.dmp

    Filesize

    324KB

  • memory/2004-16-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/2868-72-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-66-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-24-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-22-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-32-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-33-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/2868-34-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-38-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-36-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-49-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-52-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-84-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-83-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-82-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-81-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-80-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-79-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-78-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-77-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-76-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-75-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-73-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-28-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-71-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-70-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-30-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-69-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-68-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-67-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-26-0x00000000023C0000-0x0000000002468000-memory.dmp

    Filesize

    672KB

  • memory/2868-65-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-64-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-63-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-61-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-60-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-59-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-57-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-56-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-55-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-54-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-53-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-51-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-50-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-48-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-46-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-45-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-44-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-43-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-42-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-74-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-40-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-62-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-58-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-47-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-41-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2868-21-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/2868-20-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/2868-19-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB