Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 05:34

General

  • Target

    fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe

  • Size

    686KB

  • MD5

    32b604b8fd06e37c36388ab5cb01f04d

  • SHA1

    f1b0a44482c17330efa6f3ba72c1fcc32dc8a778

  • SHA256

    fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a

  • SHA512

    768a4247a2470dc6c9246b3d588596b52343f03ba17b8d86afe289de023eaf02a21a11eea7474e35a7c971a0c42d8cc9bcc1287afbbd952a91c329ca33043d02

  • SSDEEP

    12288:gmWhND9yJz+b1FcMLmp2ATTSsdApVHyGbs2CYPHrLpVmCbHDSgp:gmUNJyJqb1FcMap2ATT5itjCYZ3DSo

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe
    "C:\Users\Admin\AppData\Local\Temp\fe358ca8ffa50a8cb2c70d1b7baa5e2235c56a8f9291a3d98d659e04fc53673a.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8DB8.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\E5A5.tmp

    Filesize

    1KB

    MD5

    ebac0426435226f95fb13dd25d93a306

    SHA1

    b48d4917e13043038cb0fa5c31a105e264505fd7

    SHA256

    953a1f9f4fafc6b4533315aed68f306fea8e14b5c9007384a8b3b024a8edeca7

    SHA512

    dadb75422f4defc8d0c98fb101cedc6774762b5523347e30278d4a5b8306bd2dab20c6293f23fb1b29df53b44225d8cf6f0f8898ba019f44c5cc6d903df6886a

  • C:\Users\Admin\AppData\Local\Temp\F673.tmp

    Filesize

    1KB

    MD5

    4f33f10fcbf73320911e91276d20e0da

    SHA1

    dac27df9b9fc3b4f947cb9e833349f8fdd97f138

    SHA256

    de8b20045117a486f36c19ec918ac12cd66b4d603c57373f3800ef023c27279e

    SHA512

    98fc468d96ed3085fbcca7f6a400e9e03f3daa2ae580bf68a57b713a9cd2828626f708bde1089b1c1be3d89834e623507961ff366a7bf6b8511a98d164d20b97

  • \Windows\AppPatch\svchost.exe

    Filesize

    686KB

    MD5

    547e42d9a9e8378084f697d46e0934e3

    SHA1

    fea4a2b6b678db88caeeb8510eea7f80e1b8219d

    SHA256

    ada6369929fb6a73773ea75cd1a7aa5313ce5affadb80138b250677d3b56c88e

    SHA512

    fc6583d33bdf68ce7de1a5626741ea0159c2647f1291de8a938dc9b55cf7897fc9902df4dcad66cf473aeee57c36ac97e388a9e0b3671b21cf47550232a2d2ed

  • memory/2548-13-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2892-14-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-16-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-24-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-22-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-20-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-18-0x0000000002220000-0x00000000022C8000-memory.dmp

    Filesize

    672KB

  • memory/2892-28-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-27-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-30-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-36-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-42-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-52-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-63-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-78-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-77-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-76-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-75-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-74-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-73-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-72-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-71-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-70-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-69-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-68-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-67-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-66-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-65-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-64-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-62-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-61-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-60-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-59-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-58-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-57-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-56-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-55-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-47-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-54-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-53-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-51-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-50-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-49-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-48-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-46-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-45-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-44-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-43-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-41-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-40-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-39-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-38-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-37-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-35-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-34-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-33-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-32-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB

  • memory/2892-198-0x0000000002460000-0x0000000002516000-memory.dmp

    Filesize

    728KB