Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2024, 19:45

General

  • Target

    0f5737ffdcd3fcbb79f54c55d1278fe90e1b98070d02718f38c1dc0723f3fdd0.exe

  • Size

    686KB

  • MD5

    7ea368da6575ab0d985025714f069b3e

  • SHA1

    b9058ef549ddc5f682eba47167bff93a22dda756

  • SHA256

    0f5737ffdcd3fcbb79f54c55d1278fe90e1b98070d02718f38c1dc0723f3fdd0

  • SHA512

    bbc3791f5a8e9154c4d648065e68579ea9daa911c0738dd17825c0fab5120daaf18f103eae4a1424f5f35666a790a7001308ed2fbb4a71c64f56a29cb467e709

  • SSDEEP

    12288:3mWhND9yJz+b1FcMLmp2ATTSsdApVHyGbs2CYPHrLpVmCbHDSgp:3mUNJyJqb1FcMap2ATT5itjCYZ3DSo

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f5737ffdcd3fcbb79f54c55d1278fe90e1b98070d02718f38c1dc0723f3fdd0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f5737ffdcd3fcbb79f54c55d1278fe90e1b98070d02718f38c1dc0723f3fdd0.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1129.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\5B8E.tmp

    Filesize

    271B

    MD5

    83eb358d93a58a5515d37544731c6c51

    SHA1

    eed72863382f3f9845dc020dcdcf4c7656d619f3

    SHA256

    32d53f571a785269aa1d589299b1e02697b49130cf3059e8071a08a9a946b67e

    SHA512

    9eeff293218d0a5bee5932473c582d3eea21a20dda4afb0d44df38831da01a62eafc41fa1f15ee7dfb18379a4ef4b0327d88a78ddff270c8714245e64c88e356

  • C:\Users\Admin\AppData\Local\Temp\5F67.tmp

    Filesize

    481B

    MD5

    fb75a13077d6f73cd192bd245e13bdd3

    SHA1

    752d74a2e385ba763c196051932397db9ce925a7

    SHA256

    c147de40bc7c2e04bbd5615d9410cc3fd8fb7e7d360714626e88e68c3ab3e1aa

    SHA512

    6d5c8fcf10b303bc81acaa5464bde5f2cde01ab83ef766e644be281f1e6e41b45e1315269f6d09fd000ac2ac02ddbfaa10dd137987a149d3215334a506f9c201

  • C:\Users\Admin\AppData\Local\Temp\D506.tmp

    Filesize

    481B

    MD5

    60ebd99396991bb07c8ea993ba9fb133

    SHA1

    7e077c16445ade9d23f9d9ec566038158c9ab010

    SHA256

    88e993e81e64b13e43d2bc7e864dc5d00f6027ee4598cc64c21ef9656ece936b

    SHA512

    2005eb2efd8dbed288d8962833b14160005121e86f5aac4c908a16f184739b0af8b60102ebf6b03b16a6d519cae977560d1b35ccf6efe0f4040821d0b08ade20

  • \Windows\AppPatch\svchost.exe

    Filesize

    686KB

    MD5

    3d1fc4a4e48f91c34fb65ecc15bb9614

    SHA1

    6f9627fb697ae3d81387d41a68c8f5d0e1ebeb17

    SHA256

    f4e1b811a9c5befa038bfba68a45151817682ad551ba7960406bb6c04fa84f14

    SHA512

    4d09536273abb85e2dbb6fdd051e48445a4ba37aa15bddf336f979f590fc029c465bd103890a93865658f6f4448529a1b52e6a5873e2f9cb9fc0a11990319c90

  • memory/2608-49-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-65-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-16-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-20-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-30-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-28-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-32-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-77-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-76-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-74-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-72-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-71-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-69-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-67-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-66-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-64-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-63-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-61-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-42-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-58-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-56-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-55-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-53-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-52-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-50-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-24-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-48-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-46-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-22-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-45-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-60-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-41-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-78-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-75-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-73-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-40-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-70-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-68-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-43-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-39-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-62-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-59-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-38-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-57-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-37-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-54-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-36-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-51-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-35-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-34-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-47-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-44-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-33-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-27-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2608-18-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-14-0x00000000021D0000-0x0000000002278000-memory.dmp

    Filesize

    672KB

  • memory/2608-330-0x0000000002380000-0x0000000002436000-memory.dmp

    Filesize

    728KB

  • memory/2692-13-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB