Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 23:46

General

  • Target

    2711cdd5ab430a94edc2dcbe7570e35f54447a75a26ba3c785f34f96d2e2d183.exe

  • Size

    686KB

  • MD5

    0649fe3dd3b34eb8dca88d7dfd4e1d86

  • SHA1

    039a89e9e7913e77dae083fdb7203fc6795b6a8b

  • SHA256

    2711cdd5ab430a94edc2dcbe7570e35f54447a75a26ba3c785f34f96d2e2d183

  • SHA512

    5b8b098acde6aad200092db5cf9601d8c8d890bcb565ad946f602976bbb8181fc8050515a52a48556173527ca1ac1c878ce261380430c5779269afa5c6ad1f22

  • SSDEEP

    12288:8mWhND9yJz+b1FcMLmp2ATTSsdApVHyGbs2CYPHrLpVmCbHDSgpt:8mUNJyJqb1FcMap2ATT5itjCYZ3DSot

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2711cdd5ab430a94edc2dcbe7570e35f54447a75a26ba3c785f34f96d2e2d183.exe
    "C:\Users\Admin\AppData\Local\Temp\2711cdd5ab430a94edc2dcbe7570e35f54447a75a26ba3c785f34f96d2e2d183.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9F4.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\A85.tmp

    Filesize

    1KB

    MD5

    42b1c8364ff9e5b668c27700f3fab911

    SHA1

    84e1e4078d8dddaa6a3bfa72a7f0d738e61521a3

    SHA256

    6e7a12f054e6156667ac8030415616aed38c0ba2cae192ff8d8c20c9da562711

    SHA512

    d78a75542ed2122d1449dab861e82a7bac633e914158e6992281275a2096e6b447fa8761a0f2da4af188026b9b4809c42dc4254ca5959f733f1bb096b5ec0892

  • C:\Users\Admin\AppData\Local\Temp\BC4F.tmp

    Filesize

    42KB

    MD5

    0d708b91d78f0f47370f04b878d16a73

    SHA1

    72c70ff876590aaef42542060bfb98227b237efb

    SHA256

    3b7a5d0a1d18562b21a444d9b18b0d67326cef45838b88d09f50003f5ddcc8eb

    SHA512

    7790c72dad87014f0a5d770a2801934049853242d60e43dfb4f72bdfb59d3ff97ce08a99bf9fe5d0f04a4097c37f72ef55af3b6a10000d4c4067617224f1d034

  • C:\Users\Admin\AppData\Local\Temp\BCA4.tmp

    Filesize

    1KB

    MD5

    9c80fa6ccd05a8b868e24f6a1952398e

    SHA1

    052658f6d30177c611ac7f26a6442ed21f95dc27

    SHA256

    5e5ebdef77c98a096adfb33023cfc9e0af4f382492dfd10f6441c09a91fbb023

    SHA512

    821d4cf7802f9c31ad4a0e09eba4fc22b52fac47f5e41a99462922923f1b615bec102adcd1248a57f27a7d06d7130e61026aad1ad79ff5c93fa9c9836e4cd01c

  • C:\Users\Admin\AppData\Local\Temp\CF2F.tmp

    Filesize

    1KB

    MD5

    77001f74fe7e622bf974f00d10655a15

    SHA1

    3bcd681b82f4c8badef2b54c97a0402f8704a0f2

    SHA256

    f1b230debd49d730b3642a83d71d73e15a623b9470dd948d8dc3d2d9e4c2345f

    SHA512

    93597a9181d1b365f1ee2025713894c184dd1876e1f47693102987eba1e573df78875b2d2885e8fb0e620d8cca57a474ebb441ae4a59ebe68d2abef68fc85501

  • C:\Users\Admin\AppData\Local\Temp\CF45.tmp

    Filesize

    24KB

    MD5

    70e22f60b32f26c23a1c12c06a1175a9

    SHA1

    a369b965c7c7663bb2d88252bddd9086e86e5b9f

    SHA256

    8fe78f315748396f88add2e23d509db52d497ec9804c6e279978034a2fb44d2e

    SHA512

    28ea7948dc938f84bd9ddf91fcba8c499ddae6fd65b7c94bf708a6e8baa15ed9f66d6f672e8b8b485b8143b474cced434782e76257e7a9a50afe98cfa9c46fe2

  • \Windows\AppPatch\svchost.exe

    Filesize

    686KB

    MD5

    38ad20a2d0d2a76a71fae718aea39ae2

    SHA1

    e140202865c071da6e574a8749d68338c6a35003

    SHA256

    5be272313211fcf1f3449f015d4d93d79218be2855b08a3711b583e9cdb03f7c

    SHA512

    8143491d28e15a3a7b16d249a14ecf11a7ecd428f8e99cf8219b5e39f960ab738aaffa615e24ad22c5058a396e755ab5592d5a43d226689572a4cebe9780901e

  • memory/464-12-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2396-64-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-58-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-18-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-20-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-14-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-26-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-30-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-28-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-32-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-40-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-69-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-79-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-77-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-76-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-75-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-74-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-73-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-72-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-71-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-70-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-68-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-67-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-66-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-65-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-24-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-63-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-62-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-61-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-60-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-22-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-56-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-55-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-54-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-53-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-52-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-51-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-50-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-49-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-48-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-47-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-46-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-45-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-44-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-43-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-41-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-39-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-38-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-59-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-37-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-36-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-57-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-35-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-34-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-16-0x00000000022A0000-0x0000000002348000-memory.dmp

    Filesize

    672KB

  • memory/2396-33-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-42-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB

  • memory/2396-197-0x0000000002350000-0x0000000002406000-memory.dmp

    Filesize

    728KB