Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2024, 06:36

General

  • Target

    dff1c3d444576f4f0a1ef114c41ad934634c3f0a5fc94f925a3ed7caac4a6c46.exe

  • Size

    205KB

  • MD5

    d9394dfc0d73164ac0134fe3e7f47cc0

  • SHA1

    9ed038f8c4224e444e26cf6442015452b24ec0d0

  • SHA256

    dff1c3d444576f4f0a1ef114c41ad934634c3f0a5fc94f925a3ed7caac4a6c46

  • SHA512

    b6aa785c02c4818a5cab67ffe848d2f60ca6a18ff363928634f381282803c28ea0dffac9975434765a89daba6f748f173c42735e1bba8076d99473e29110eda7

  • SSDEEP

    3072:S7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:IzHnMLm5GNGxHUhtnkdpHqTKzhh8i

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dff1c3d444576f4f0a1ef114c41ad934634c3f0a5fc94f925a3ed7caac4a6c46.exe
    "C:\Users\Admin\AppData\Local\Temp\dff1c3d444576f4f0a1ef114c41ad934634c3f0a5fc94f925a3ed7caac4a6c46.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    24KB

    MD5

    679db42bb5d7da32d5a43b31aaf1c7c7

    SHA1

    024e7ac0a011726fc9b3ed63ddede31186a8dcdb

    SHA256

    4cf39a2508437f9418c40d3054c0d54c62f06619087f282755e3876a52bceb92

    SHA512

    8d45f7cdeaf48070e39071b3a9ab827f2930660094f77c1c27abe6dc7659c7f184f0ab91f9ce9aa8af231d873070501f72d85525257733c8dc0d010c11f7b8c9

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    385328f436a662335464e16114d7891a

    SHA1

    fe6a4d06331d85818232d385582090a1dfba0a86

    SHA256

    62fe5edcf05021b004f9cc72857fcb5caa5d21182ecac269ebf95610179f55b2

    SHA512

    9f8f7746272c8d8c9ede286f59a5199f00b1d986a91f343f0822d465fde9a6072152c6e07cd9e3822da6242d0abdde5df7c85b6e4696e8c51b2fd20b146df1b9

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\vojyqem.com

    Filesize

    1KB

    MD5

    0c0e576f52b91346c364422c0cf88881

    SHA1

    a6780d416ccdc8af9232fa4bdd5720dae6cf76fa

    SHA256

    2348e0109de1736cc3cd94e8648b45315d598fa4b01b1561aa1a879f153dbe16

    SHA512

    3193c7703bd96f2ff7f2425a350b54d1aa92221cc4f76b518bf478be53893a878f95a617a6a1bedd33233030b27305ca934fa1c44e1e3c5001cd9e2003c5ff7f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • \Windows\AppPatch\svchost.exe

    Filesize

    205KB

    MD5

    62bea221f78171e0df17956b4b398f19

    SHA1

    1838b16c9b747608830b39746fcdf5286594e325

    SHA256

    027c2e6d529b14b0812c09a23b371d5d95bca594a611d9cd65e07b9e33a2534e

    SHA512

    7eb1fe63be50068697d46bfeae279bb0d8cd375356f386a6b8824d028d9db3d59cb85ac832880c63dd10039e8e67be0d27f2a2f0bef17a2e690562c52d54abda

  • memory/604-72-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-67-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-44-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-21-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/604-22-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-32-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-30-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-33-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/604-28-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-26-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-24-0x0000000001CB0000-0x0000000001D54000-memory.dmp

    Filesize

    656KB

  • memory/604-34-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-36-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-38-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-46-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-51-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-84-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-83-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-82-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-81-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-80-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-79-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-78-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-77-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-75-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-74-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-73-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-61-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-20-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/604-71-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/604-70-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-59-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-69-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-66-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-65-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-64-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-63-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-62-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-60-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-68-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-58-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-57-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-56-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-55-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-54-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-53-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-52-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-50-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-49-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-48-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-47-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-40-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-45-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-43-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-42-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-41-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/604-76-0x0000000001E90000-0x0000000001F42000-memory.dmp

    Filesize

    712KB

  • memory/2524-19-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2524-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2524-18-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/2524-16-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2524-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2524-1-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB