Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 13:57

General

  • Target

    6e099fddc1f44d1bd61e743ed0bda410f0e28354c5f82661f66cd25aaa6ad47e.exe

  • Size

    208KB

  • MD5

    87f94eb25d7c79d485ff042858bed87f

  • SHA1

    de7f2c626ab175d29571fb57db853008452e97d3

  • SHA256

    6e099fddc1f44d1bd61e743ed0bda410f0e28354c5f82661f66cd25aaa6ad47e

  • SHA512

    f203ea7833f0aab58fbda205897c9d2cc23eb827d9843fe6ef3b55aa874e8a23557b0544c26ec7e25b5232815edb7fd1bd3a5d40ec14af22e0f7aeb4726d3ea1

  • SSDEEP

    6144:MZWia9ubuBsyGvMwlvaB8Mi5vz9IGePA+hq5O:aquCuygMQjd5vJIBP1z

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e099fddc1f44d1bd61e743ed0bda410f0e28354c5f82661f66cd25aaa6ad47e.exe
    "C:\Users\Admin\AppData\Local\Temp\6e099fddc1f44d1bd61e743ed0bda410f0e28354c5f82661f66cd25aaa6ad47e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    c940eb5aac95a17675174d9b17d1a988

    SHA1

    4bbe9094751d4c2658ec026b51502b1e929e7c81

    SHA256

    e9ea0893d362e1504d63aaf66c5b10f0bc5e5a6a0dfc80e13cca7f1f4687f3df

    SHA512

    2d79ecb693501afa802eef406e9634e3cec0d3fbb378356e2425ce96fc341758dc75f2b2a53da8236c679beaf7cf450088b55863a256cc9bda242c76f8b6e976

  • memory/2092-72-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-69-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-23-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2092-26-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-42-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-51-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-43-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-58-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-34-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-32-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-35-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2092-30-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-28-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-24-0x00000000020C0000-0x000000000216A000-memory.dmp

    Filesize

    680KB

  • memory/2092-36-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-38-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-40-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-46-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-50-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-86-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-84-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-82-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-81-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-80-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-79-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-78-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-77-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-76-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-75-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-74-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-19-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2092-73-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-59-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-18-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2092-68-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-66-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-65-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-64-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-62-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-61-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-70-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-57-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-56-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-55-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-54-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-53-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-52-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-49-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-48-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-85-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-83-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-47-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-45-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-71-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-67-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-44-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-63-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2092-60-0x0000000002790000-0x0000000002847000-memory.dmp

    Filesize

    732KB

  • memory/2124-22-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2124-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2124-1-0x0000000000240000-0x0000000000292000-memory.dmp

    Filesize

    328KB

  • memory/2124-0-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2124-21-0x0000000000240000-0x0000000000292000-memory.dmp

    Filesize

    328KB

  • memory/2124-20-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB