Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 07:45

General

  • Target

    2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe

  • Size

    218KB

  • MD5

    8b6d3276623e6bacb5866b8a9a3a184c

  • SHA1

    09d5f71f0e39638ced6ee6ce1c9bb054d1194ac5

  • SHA256

    2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365

  • SHA512

    bff04a671882846f19cb5edad75e200b006cf2026ea335f69930f221757c0dfef916783a6f7b710ee0a4ad0ffb6fdeefa71f47ca80c0c8b80943f26e34bd5254

  • SSDEEP

    3072:bvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2Hu:j1SyAJp6rjn1gOObn4b6h9L

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe
    "C:\Users\Admin\AppData\Local\Temp\2ef2848abc93b3dc5a629af2fa2e40dd44154d7f0f1ed003cb9ce7f6d5bfd365.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\3FE8.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\AA25.tmp

    Filesize

    24KB

    MD5

    f4f458501e72a16a5cab99e525daf079

    SHA1

    771fcaa13b818333aa7765c268ed2314003474b1

    SHA256

    4440714f2a167670b851a262638809220eebbdff1725e50355e2db5db5bcbbcd

    SHA512

    8a7a7d5a83811d2ec9d077b49da11e7e347b99b7a769b5b1dad49f6682ef7d1567a5f8eaeb908d0fa78591422051dac4e7dea2d015748e1db1b6193ceb423c21

  • C:\Users\Admin\AppData\Local\Temp\AAAA.tmp

    Filesize

    481B

    MD5

    b63c259c6242b1f91aee99dbe2b99af2

    SHA1

    df02758b210af5b75ae1ce328600538080eeec67

    SHA256

    25a84a1d47f2b2ccc0633fa1dede341d26a88190635c0f1f8eb0210167f6144c

    SHA512

    37d63584acb0407e7836d6f2c493fbfb78eeeccef342f30ea40510490d96ce0f4f335ac366b082a934856382484ec6d9e961a77233610ab613dfd52035a262fd

  • C:\Users\Admin\AppData\Local\Temp\CCD1.tmp

    Filesize

    1KB

    MD5

    5b84332c7435c0938c07bac354b38dab

    SHA1

    726c53a1b92a7cd7d8d35c614cfc3064fe6cdadc

    SHA256

    f667778ebe208b98d6060ec7b258b1162d5473d221bd6a7acbee96f87162156d

    SHA512

    d08bdf0ac456df0386b22981950eb1f127c8b6dd76d79016d763432413856921f359fcc2bf1835a3c1fa5ad2772209db1576a4f2fbaebe9149c652bc53acc579

  • C:\Users\Admin\AppData\Local\Temp\CCE1.tmp

    Filesize

    41KB

    MD5

    4d43f4ed3f60de9136c587cbe86d2f77

    SHA1

    fddce6f2a41971e3546f4e93b3c8ce7d82865a6f

    SHA256

    2008886c0fcca6538b75cd3caef631e27da1a129ceb0605b585e1e63ba6ded84

    SHA512

    225f4ebf241345cf48676c6baab818397b1c88e978935971091facdab2177071d451bfb2e4b00f53711e37e6c58fc965f72ff719c205273ae2da1ce38d182096

  • C:\Users\Admin\AppData\Local\Temp\CCF6.tmp

    Filesize

    481B

    MD5

    cd879bf8227c0102266b0c1578e9e743

    SHA1

    da4a24317989f3a69c123f1c7b4cf68439f22b45

    SHA256

    ba90b5ef670af806b92ab69dcbb039eacab146589f91d6225381cf1f51b978f0

    SHA512

    f71b1e9146a26431574cbadaf29af0d4d290eb581e68ba7076b2260f9297aa5d62764732b1f9e78bfdb387fe0cea2ebd844f7665a20b6de93d2eacabab2d1b5c

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    218KB

    MD5

    06d1f9bd8926d5ca3fd0a9aae33eca8c

    SHA1

    590055c02c24d0e1f2838062c2af5e635341551c

    SHA256

    9b3f6c4d90818c47fbb613f234235d867570642432d03c3ba3e1b3f0dbcbdb39

    SHA512

    0ac77fc4620248c62a5fcfab79e9287d527fe5df19ab8f053afc66e589f957558c2c329a65bc306dd7afb8682e670168e81e309eba209b875acfecb224ff3b85

  • memory/1268-60-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-83-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-24-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-32-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-34-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-36-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-38-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-79-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-84-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-82-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-55-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-81-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-80-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-78-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-77-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-75-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-74-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-73-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-71-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-70-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-26-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-28-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-69-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-67-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-66-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-64-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-63-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-62-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-30-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-59-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-58-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-18-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1268-31-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1268-53-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-52-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-51-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-49-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-48-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-46-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-45-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-42-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-76-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-72-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-68-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-65-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-39-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-61-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-57-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-54-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-50-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-47-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-44-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-43-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-41-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-40-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-56-0x00000000025C0000-0x0000000002676000-memory.dmp

    Filesize

    728KB

  • memory/1268-20-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-22-0x0000000002410000-0x00000000024B8000-memory.dmp

    Filesize

    672KB

  • memory/1268-19-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2032-0-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2032-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2032-17-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2032-16-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2032-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB