Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 00:42

General

  • Target

    77eb44feed2a80daa5c4445b1d3976efbcbdadd6bc226953072a1dcea9c80510.exe

  • Size

    204KB

  • MD5

    1aae0ccd5d8cb5683857d1527228bf80

  • SHA1

    ed6e36d4f8d5bf34fdc7e547485f331a5ab94fdc

  • SHA256

    77eb44feed2a80daa5c4445b1d3976efbcbdadd6bc226953072a1dcea9c80510

  • SHA512

    219be367416c537fb805d439ab45e2f41c1d366a1b9e172bb8a8f367e86d82407e70728debf5b2c6cd2ded263e9bfd6d0bb37a6e9757217d04e298aa1beb5848

  • SSDEEP

    3072:e5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:eLexkuRaX41xoyJV65gzyZko+uch

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77eb44feed2a80daa5c4445b1d3976efbcbdadd6bc226953072a1dcea9c80510.exe
    "C:\Users\Admin\AppData\Local\Temp\77eb44feed2a80daa5c4445b1d3976efbcbdadd6bc226953072a1dcea9c80510.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4673.tmp

    Filesize

    24KB

    MD5

    1dc76297f1dd98d1189dda221c788465

    SHA1

    17575620bda3083f3f39d1520a7b46e8fb51d0eb

    SHA256

    b3d3d7fbe8b294e1bbdcff5826becb17a5b10dab0e257b15bfbe5cdd53731f30

    SHA512

    e2759b57ad47681dcd470e9f9770ecb136ea8684c844594b4f8a52388b8c2f1df7f048493b3cac18b1e1bca45ddcd90206f91158a075a081e963b0c3b4450476

  • C:\Users\Admin\AppData\Local\Temp\46C4.tmp

    Filesize

    1KB

    MD5

    168a69a9a3f850eba3139ac4b9abc8d2

    SHA1

    feef854e18830faf550f9400d480d27f076e29fb

    SHA256

    1daaf28aa40549b2141d4fe98aafb158ef16357e6dfc465052fbc59c7f6aece2

    SHA512

    5450e248e3c7346e6c14380bf5f1cc6fe48ccdac66916f7f5b5d4cc76d29d7eb36516423bd5681565aee693ff287df8ae4f36e3d56a0da5551dd471f1fe192ee

  • \Windows\AppPatch\svchost.exe

    Filesize

    204KB

    MD5

    3ff881243d14679a7538eeb563ebf83f

    SHA1

    979ea77d5c0378be6e2dfb961b66b8dccaf6ffe3

    SHA256

    e0db93b89088283858cafaf968845ff905e89d07717c6b3efff11444316de10a

    SHA512

    1bbcae32af20924c74034d47794c205fb6652e1560e0f6d6d10c0b64f7eaae2421ee6d23732d10154d43949b9e676cd57a7814c76a7ca271fceb2e456acdd549

  • memory/1792-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1792-1-0x0000000000310000-0x0000000000361000-memory.dmp

    Filesize

    324KB

  • memory/1792-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1792-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1792-19-0x0000000000310000-0x0000000000361000-memory.dmp

    Filesize

    324KB

  • memory/1792-18-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-76-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-70-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-28-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-30-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-26-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-21-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-32-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-33-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-34-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-38-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-36-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-41-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-46-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-60-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-84-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-83-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-82-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-81-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-80-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-79-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-78-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-77-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-22-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-75-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-74-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-73-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-72-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-71-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-24-0x0000000000580000-0x0000000000628000-memory.dmp

    Filesize

    672KB

  • memory/2756-16-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-68-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-67-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-66-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-65-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-64-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-63-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-62-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-61-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-59-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-58-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-57-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-56-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-55-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-54-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-52-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-69-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-51-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-50-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-49-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-48-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-47-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-45-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-44-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-43-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-42-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-40-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB

  • memory/2756-53-0x0000000002890000-0x0000000002946000-memory.dmp

    Filesize

    728KB