Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 20:06

General

  • Target

    1660e4e137fae3a352e8c76a53e8c49e7d9797f76a632f37bf2a36af5c33a456.exe

  • Size

    218KB

  • MD5

    5371937f45ef141a0a7b34404ddeb508

  • SHA1

    2c57999aed57290420fe7c09a02a8f9c7f7f9d39

  • SHA256

    1660e4e137fae3a352e8c76a53e8c49e7d9797f76a632f37bf2a36af5c33a456

  • SHA512

    f6c6739f3bcd4674153fbb710fc816fa01c4a4b92557917c3d04394647768dd0f5757cd22a11e49ec4165ca8e9adb50e94201f5009e91bff41db5bdb06fdbe64

  • SSDEEP

    3072:dvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:R1SyAJp6rjn1gOObn4b6h9h

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1660e4e137fae3a352e8c76a53e8c49e7d9797f76a632f37bf2a36af5c33a456.exe
    "C:\Users\Admin\AppData\Local\Temp\1660e4e137fae3a352e8c76a53e8c49e7d9797f76a632f37bf2a36af5c33a456.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\66A6.tmp

    Filesize

    1KB

    MD5

    b22719aafdc71ad74a0756c42166758f

    SHA1

    0b226a4d4f7a5cc0ae4286d010bd3646ec315708

    SHA256

    cd436dc2126ce72bc7a4746f2c72f1e0586e0de4905e0e61256264d06df44484

    SHA512

    3bc6e66ab98425befb66e7c73307d9faac7971aff6663f059b8012751b571b3e9d85a1bf02f21b5cae6d9b52d345706548fe7d980d7c0048d62d88e1f92efe64

  • C:\Users\Admin\AppData\Local\Temp\79DA.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\AD23.tmp

    Filesize

    24KB

    MD5

    dc0a756bcefdfafb548409b75702bde3

    SHA1

    6dc2091a6bf870dc71bbadf52ff721811c49b07c

    SHA256

    29e7e7990dc3d76c2b8943a1b187eef3420260e3b41bf6f6f8532549ca45c6d7

    SHA512

    cd6b406fa2815e0f88aa2521b52dfd5ff30c831bc2be40f91509ead17bfc2a12040d8683eee3b3e7e0872ff9ad8ad10e3d606c62fb0a719e65cc5a5a33d5dd49

  • C:\Users\Admin\AppData\Local\Temp\AD37.tmp

    Filesize

    1KB

    MD5

    f5f0856884cc3a5b8bfe7ae8020574c7

    SHA1

    40e5c8597e084f3bef6fc5574dfd0623ed754050

    SHA256

    deee69492dc2a7362118c217f15b7483ff04f81d3a789944550474ee4b56f66e

    SHA512

    12196197ffc29650bb6c11e19e8ae597ac65e0c2fb5d790ad410775a26f426e33185a6dab1d153bbf9beeb9ce0fe1ec40926fb329204c8ddd06cb1f616302426

  • C:\Users\Admin\AppData\Local\Temp\E2EB.tmp

    Filesize

    1KB

    MD5

    2c1cf373e9c875314ac86a1a426c78a5

    SHA1

    55799b7f06784c1b2dbdd4bd6d57f2a9585fdfed

    SHA256

    6623fe38afb07003d4766177a7deb88be11c759fc36d18d3c4a29a6a4c9469ed

    SHA512

    80538340515a6ece2ce28fa706ddc34d99b6a4531494afef2692bbdb0ef78e89231cc803d5fc3c184fb2ed6b5bd74a7c1541752644cf1beb4d5c9b1d5eb0702b

  • C:\Users\Admin\AppData\Local\Temp\E331.tmp

    Filesize

    42KB

    MD5

    95af9092dce4db55b74786678c939205

    SHA1

    cd53143dd5a91f903e796097d77b17738b4d9948

    SHA256

    cc7d21bde2b105a2ff140794ee042ab11fd03370adcdc81e351c79150aaef7d2

    SHA512

    238b358ea4492e2f9da6660771307c592e0ea22ff44e7a533b92c51c7edfdd3f502f5b122a988cb7537a34b54e35e868e4ec8236745365ffca9b392c257cb0ec

  • C:\Users\Admin\AppData\Local\Temp\E331.tmp

    Filesize

    42KB

    MD5

    4e03111a8f74b30e5e899c16853b104a

    SHA1

    9ee9eaa88edf372424f8f724782a785d05c354a3

    SHA256

    694d02dbab49db0c3908e7b537e9a5e8c8de58aee8a95eed21be753fc1806f52

    SHA512

    d41bafdcfe302836dc4631a9d1a3c347b01088be61b4d42d02ce69fcb29183ec7fd89d4ea3b50e34498d9104f8e16fafd8b06bd8f24f57217f778e838667ec21

  • \Windows\AppPatch\svchost.exe

    Filesize

    218KB

    MD5

    74a761ebde56d56eb2edc3e3760714b3

    SHA1

    330911179eb7c171660411dcead510d3332ef42c

    SHA256

    40964f50678aa8db29940d818cd36c2030f672126a77c906fb5ae2f133758cc3

    SHA512

    9b274069a12d51f5f30babb3835e2f230876f91018954a93ec2739f1b63307125b7b65e6a4980bab04f00bb446a07ae4c9a93f231327216cc5fe6e04b1144aed

  • memory/1732-68-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-39-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-30-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-28-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-31-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1732-26-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-22-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-32-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-34-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-36-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-64-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-44-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-74-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-84-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-83-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-82-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-81-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-80-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-79-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-78-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-77-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-76-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-75-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-73-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-20-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-72-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-70-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-69-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-66-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-67-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-65-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-18-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1732-24-0x0000000001F10000-0x0000000001FB8000-memory.dmp

    Filesize

    672KB

  • memory/1732-63-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-62-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-61-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-60-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-59-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-58-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-57-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-56-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-55-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-54-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-53-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-52-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-51-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-49-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-19-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/1732-48-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-47-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-46-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-45-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-71-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-43-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-42-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-41-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-40-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-38-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/1732-50-0x0000000002570000-0x0000000002626000-memory.dmp

    Filesize

    728KB

  • memory/2292-16-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2292-15-0x0000000000400000-0x00000000005AE000-memory.dmp

    Filesize

    1.7MB

  • memory/2292-0-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2292-17-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2292-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB