Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 21:19

General

  • Target

    d39bde976bc16d8a1b98272b80ee0f45bc169cb014a0418a7d2da6c4c0400281N.exe

  • Size

    206KB

  • MD5

    b31c15782e5884493f92ecbcdb0b3210

  • SHA1

    a83d0145c745313f2a157510a5eb5be10f46c0c0

  • SHA256

    d39bde976bc16d8a1b98272b80ee0f45bc169cb014a0418a7d2da6c4c0400281

  • SHA512

    804b792a7f82935c4a47d9d6ad38859d4fe4876d65e45afcd5e3f29f3a9de622ae3125701056d28098b1023d0fec1d1e7a16849ac7d29530e3198340c6b3c865

  • SSDEEP

    6144:A+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:A+U9qyFhJy56d/eoyXjn9W+

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d39bde976bc16d8a1b98272b80ee0f45bc169cb014a0418a7d2da6c4c0400281N.exe
    "C:\Users\Admin\AppData\Local\Temp\d39bde976bc16d8a1b98272b80ee0f45bc169cb014a0418a7d2da6c4c0400281N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    580328759a6dbf2ec819873923b7f29a

    SHA1

    dab1abdb5701f7f4311b5fcaff00db13b2a9bf92

    SHA256

    fdf3c74be0279e992637b339e0ba45c3b8a022bbfa7a32e547a63dc9d0f1483b

    SHA512

    b462ae3dbda50454abd0373927cfdb45b845c133c15b8f647a4b2da5f663cdae33b13040d2a3cf985ecb0632d2b5f942a5855b870bd44e8bb95fc4bf2775a4c2

  • memory/1724-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1724-1-0x0000000000330000-0x0000000000382000-memory.dmp

    Filesize

    328KB

  • memory/1724-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1724-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1724-19-0x0000000000330000-0x0000000000382000-memory.dmp

    Filesize

    328KB

  • memory/1724-18-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2168-21-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2168-22-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2168-23-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2168-24-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-28-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-34-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-35-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2168-32-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-26-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-30-0x0000000000350000-0x00000000003FA000-memory.dmp

    Filesize

    680KB

  • memory/2168-36-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-38-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-41-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-45-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-44-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-69-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-86-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-85-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-84-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-83-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-82-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-81-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-80-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-79-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-78-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-76-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-75-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-74-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-73-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-72-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-71-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-70-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-68-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-67-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-66-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-65-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-64-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-63-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-62-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-61-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-60-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-59-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-58-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-57-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-55-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-54-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-52-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-51-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-77-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-50-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-49-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-48-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-47-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-46-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-56-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-42-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-53-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB

  • memory/2168-43-0x00000000023F0000-0x00000000024A7000-memory.dmp

    Filesize

    732KB