Analysis

  • max time kernel
    110s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 00:27

General

  • Target

    385432d1dfc56534afe68c1c388531272ac84485106a68ac09ce65595ce4f2a2N.exe

  • Size

    208KB

  • MD5

    9ef3058659e38bce3783f2f1e1938950

  • SHA1

    be4dded65a144c652b41dbe3b77716258e225b95

  • SHA256

    385432d1dfc56534afe68c1c388531272ac84485106a68ac09ce65595ce4f2a2

  • SHA512

    3646ce3a61f276c68bc14ff44c4553dee89f28cd395e211f5febd66c96270db3dab852393a1c710571890d3db6b8dcd19ddcc0043fca7b27f577f1b5f138d7b1

  • SSDEEP

    6144:6a1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfk:6bapK0JCmRcU9vVokf

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\385432d1dfc56534afe68c1c388531272ac84485106a68ac09ce65595ce4f2a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\385432d1dfc56534afe68c1c388531272ac84485106a68ac09ce65595ce4f2a2N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\313E.tmp

    Filesize

    42KB

    MD5

    bd05e6d8d01f8c2f3fa812d00098a467

    SHA1

    7fff6c8b17edde13ccf69dc42fa22b67d463787b

    SHA256

    6ff0c8fc0a5c8548112664eb158fe7d6af47709a90f66785bc886c0b90be9d30

    SHA512

    0b3a863457a19b97e66bb7da779d43d9372f2a154495e05da050b4bb2281581203016b28d625c59ceb2512f350fbd64df1a2b792410ab282628edf84cd9c6774

  • C:\Users\Admin\AppData\Local\Temp\313E.tmp

    Filesize

    42KB

    MD5

    177a9d0ab56a056a0ab25a56b0b748b7

    SHA1

    c426769d0873c33d776641c52b6369a472ac3a13

    SHA256

    51150ef921b945585a3434d4e00554ad1a8e33fc41dd08330cf8ffa1827ab68f

    SHA512

    6052a05050735eb7c0795fb7953e7ca535965d2f6a43d7d64d5ab97fb81eb5ccc76231b189547e38e361636acd0cb7308a55a0438c27d2c6efcb8b3f8da7d1f9

  • C:\Users\Admin\AppData\Local\Temp\3191.tmp

    Filesize

    24KB

    MD5

    664294b45c08f740b7a2857c8f37024f

    SHA1

    ce8c2dadd9c8462e75c0b9071d075953b2607c77

    SHA256

    2949a88581753073a404188007c61eaf80d1e12cc721f555332a764629258a97

    SHA512

    f6824ef38ff4ff8b8c2d47ed0448b2bdc24679996f1e3b4408280704638b3b9abe7d473ecb78444dfaaa61bf10843b38a949225a221b57877aef8c54a6f6a666

  • C:\Users\Admin\AppData\Local\Temp\31E3.tmp

    Filesize

    481B

    MD5

    5a16e8934aefbb017a16655de38a739f

    SHA1

    df78851d07f028205494bff5a8a96d7eb2d76603

    SHA256

    da9dc5fe1c66402ac8bb2b809405c8b732515764579bbdf9a5397808b128f2ff

    SHA512

    cb86fd9896671bc50beb371521fc393709baa04c8dcde8fe72de76081e67e7778384c49d6fd31be86c5c5e54667a749041de32efbb9776a38a863c9a7ca5c15e

  • C:\Users\Admin\AppData\Local\Temp\6953.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\B4AA.tmp

    Filesize

    481B

    MD5

    65c6f15f9ae2c9049fd0bf9a229d324a

    SHA1

    26f9bfe8d728ddd3b7ec1faa4897cf407dbc3594

    SHA256

    834f8edfc597d9d19a47c9b29892b8522f1ec8420acc4784f7aabc05e8731db0

    SHA512

    5b9fb5813b61f312f8d26b3a6587e86e1795b8ff7dbfe24bd80fdc3f448d2646ecf24edbdb8cfe99a72389ae5ad089f6e6be2bb67b968aa7a07b6451596dacaf

  • \Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    d31fb864939350601bc85992b8bb7e80

    SHA1

    d3fe9007f38e13bb60421f5ae51e4dbbfa77950c

    SHA256

    703ed9c7a24a8dce484f7edb5087a8a472f5a9f6ea54795348801ab5663f821e

    SHA512

    210cb1029f576c799a92eaf62d76a2e177239459f2416032887797b4f1636191b3ede32de94d15e7c6c4ac19959a7fa828cd2c4e2bd04707b24ae804ff2baac4

  • memory/1568-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1568-12-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1568-13-0x0000000000240000-0x0000000000243000-memory.dmp

    Filesize

    12KB

  • memory/1568-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1568-0-0x0000000000240000-0x0000000000243000-memory.dmp

    Filesize

    12KB

  • memory/2388-67-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-61-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-25-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-28-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2388-21-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-19-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-29-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-33-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-31-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-44-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-80-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-79-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-78-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-77-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-76-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-75-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-74-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-73-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-72-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-71-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-70-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-69-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-68-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-23-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-66-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-65-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-64-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-63-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-62-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-27-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-60-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-59-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-58-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-57-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-56-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-54-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-53-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-52-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-51-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-50-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-49-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-48-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-46-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-45-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-81-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-43-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-42-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-41-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-40-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-39-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-38-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-55-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-17-0x0000000002160000-0x0000000002208000-memory.dmp

    Filesize

    672KB

  • memory/2388-16-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2388-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2388-37-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-36-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-47-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB

  • memory/2388-35-0x0000000002400000-0x00000000024B6000-memory.dmp

    Filesize

    728KB