Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 16:26

General

  • Target

    c4fc2780739af0205518d8461c75f98ac337a2565f16f1ed70b75f52728bc117.exe

  • Size

    206KB

  • MD5

    795e5a45c94ab2e83e3931532f71d241

  • SHA1

    c0f72f52e25397f1ffead293084db1863817e91a

  • SHA256

    c4fc2780739af0205518d8461c75f98ac337a2565f16f1ed70b75f52728bc117

  • SHA512

    1e5477400bafe2f01303ad789279191bd8d69ff45bcd650d5376cb8735a223b0a7e6eed164bedaafebd148074681a48166f525be1bd928910fd36125835fd9d8

  • SSDEEP

    6144:F+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6Tq:F+U9qyFhJy56d/eoyXjn9Wq

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4fc2780739af0205518d8461c75f98ac337a2565f16f1ed70b75f52728bc117.exe
    "C:\Users\Admin\AppData\Local\Temp\c4fc2780739af0205518d8461c75f98ac337a2565f16f1ed70b75f52728bc117.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    206KB

    MD5

    2d28742457d01c8a3e3c97be0d0f03fb

    SHA1

    ec34af4b529593c93def80b2112226a6b30ff7d8

    SHA256

    80f8969c833fb77f16c28ec51bd2f6ab1089eacd9941f466aa60050a316ebf9b

    SHA512

    4f38339046fb1b99f6afd577cd2a570d17679d246d7b6c6340c0d2466f30dc93dee7ee51110ae1cc2b474a8567ccffcfd5984fbd6b0c342258537a484a136a13

  • memory/1452-62-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-44-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-24-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-23-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1452-64-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-42-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-20-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1452-54-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-32-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-34-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-60-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-28-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-26-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-35-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1452-36-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-38-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-41-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-56-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-85-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-83-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-81-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-79-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-78-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-76-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-74-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-73-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-70-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-69-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-67-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-65-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-43-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-22-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/1452-30-0x0000000001CE0000-0x0000000001D8A000-memory.dmp

    Filesize

    680KB

  • memory/1452-59-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-57-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-55-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-53-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-52-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-51-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-50-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-86-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-84-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-82-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-80-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-77-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-49-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-75-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-72-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-71-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-68-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-66-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-48-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-63-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-47-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-61-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-46-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-58-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/1452-45-0x00000000023B0000-0x0000000002467000-memory.dmp

    Filesize

    732KB

  • memory/2316-21-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2316-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2316-1-0x00000000004A0000-0x00000000004F2000-memory.dmp

    Filesize

    328KB

  • memory/2316-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2316-18-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2316-19-0x00000000004A0000-0x00000000004F2000-memory.dmp

    Filesize

    328KB