Analysis

  • max time kernel
    108s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 20:30

General

  • Target

    315318286c2a85dc68d1104234147521718a25316947489278b5f4b584ceec7eN.exe

  • Size

    1.7MB

  • MD5

    adf59c70765a4bf0d1d9c0e5bf5e1d10

  • SHA1

    d0defb6a3f4badd8080ac997f25b9d06633a9b0d

  • SHA256

    315318286c2a85dc68d1104234147521718a25316947489278b5f4b584ceec7e

  • SHA512

    e472ca43b2b9488dddd69e0c5a7b4caed41ade2e2eefe004022c42c6eca20c31f77c8118ea752bc5507843f458271f3256b22f9b76377e9d1e433b2a751b9914

  • SSDEEP

    24576:TmUNJyJqb1FcMap2ATT5rmUNJyJqb1FcMap6mUNJyJqb1FcMap2ATT5rmUNJyJqG:TmV2AprmV6mV2AprmV6mV2AprmVG

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315318286c2a85dc68d1104234147521718a25316947489278b5f4b584ceec7eN.exe
    "C:\Users\Admin\AppData\Local\Temp\315318286c2a85dc68d1104234147521718a25316947489278b5f4b584ceec7eN.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7411.tmp

    Filesize

    1KB

    MD5

    2c3bfa8361bb12a4f05f36d7f8a691f9

    SHA1

    5cdc7d664afdf18fb961dcea6a6c4e9ac036a7fc

    SHA256

    20b64aa6ce6780de7d1ec94c6a561f8d0a16eaef13718d18221f6a9311e3ba3c

    SHA512

    b1e0c4194f9a9758f5ccbbf67b1a616099b86ffc8318bef364818f2e3f3d8da793a164b103151dbc4ed5e9e19fc83bdc2da1c0a9ef98dc09277f1a084f398a90

  • C:\Users\Admin\AppData\Local\Temp\C124.tmp

    Filesize

    1KB

    MD5

    bfb9fe277834c1e7bc3c677780147470

    SHA1

    a2bf9087d34f4d426fe835aeb39ed51fe9fd33bc

    SHA256

    e241a6af8a6d26b09a11f7ad5541aaf87b8b5b0ad779f69f15c8e4ef82613cc6

    SHA512

    87f552dcb93fd05a1eb6323abc9b2424f3faca6611d808116037af13f18e51ba52fbe7545d277fb746d264bc51aa2638dc9728d7066c31cb1e16438ef5edede7

  • \Windows\AppPatch\svchost.exe

    Filesize

    1.7MB

    MD5

    46ae5004fa6a7fc8b64369f998a25c4e

    SHA1

    4e620121c467b5eb80e3780103bd8f1562e6fcb6

    SHA256

    024de9997fb8365e2ac37e269ec108a923257f90f75b983b64fd9ef0be1ad39f

    SHA512

    be0461985a8c369ee29ed19b4e854b7a534266da8f3857c18c133ce63e2944e7a19fc5720bb822215354cb52ef9f9ee50a6ef9bf18fd182d777dd247c8b9c097

  • memory/2236-14-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-24-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-22-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-20-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-18-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-16-0x00000000021E0000-0x0000000002288000-memory.dmp

    Filesize

    672KB

  • memory/2236-25-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-29-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-27-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-38-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-63-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-77-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-76-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-75-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-74-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-73-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-72-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-71-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-70-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-69-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-68-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-67-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-66-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-65-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-62-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-61-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-59-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-58-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-57-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-56-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-55-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-54-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-53-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-52-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-51-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-50-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-49-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-48-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-47-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-46-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-45-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-44-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-43-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-42-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-41-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-40-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-64-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-39-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-60-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-37-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-36-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-35-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-34-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-31-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-33-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-32-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2236-191-0x0000000002390000-0x0000000002446000-memory.dmp

    Filesize

    728KB

  • memory/2944-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB