Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 03:21

General

  • Target

    d296e049cb14756050ef9d93d5b4475036dc32716b3ce24b68e15a6e9a4e255e.exe

  • Size

    204KB

  • MD5

    f137685c54480141fcd728e085c8d7bb

  • SHA1

    346f5caa98d13d6d6f592b0772f7cf714a71e6f7

  • SHA256

    d296e049cb14756050ef9d93d5b4475036dc32716b3ce24b68e15a6e9a4e255e

  • SHA512

    4f2c1beee46dca57d2b78b713c316f2779e51a77cd07971c64bed208928d8fed9a1d1c13d4f8fe10c1cd35a9dc7d32d5efdd9bc5100ca007e914a34bc9ac63cd

  • SSDEEP

    3072:15u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:1LexkuRaX41xoyJV65gzyZko+uch

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d296e049cb14756050ef9d93d5b4475036dc32716b3ce24b68e15a6e9a4e255e.exe
    "C:\Users\Admin\AppData\Local\Temp\d296e049cb14756050ef9d93d5b4475036dc32716b3ce24b68e15a6e9a4e255e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2055.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\8958.tmp

    Filesize

    24KB

    MD5

    122b50ed622ddb3b94269ab0f6737938

    SHA1

    64efa0d64735c745e254bccf38cbb36171fe7c40

    SHA256

    a888f9856756a3d8d1b78a240b198059d05471fdc5434449de206938cb879eaf

    SHA512

    fdbb6955e2586053fb1c9f2ba68aeca814356f8a903d585b5e08d2a387ffeccfccb2875d9d849428c4bde256fc941d0853d8c23927aaa6cd89c570e1b3d56f5a

  • C:\Users\Admin\AppData\Local\Temp\896C.tmp

    Filesize

    42KB

    MD5

    9e194a57b5562a6be1bd3980d23c3d35

    SHA1

    97fba2f8d789038f2d8ad44595a4d53bfabe5dc2

    SHA256

    896c0521e35657f972422f02a5e32c3c2275a147bd996ab24a550e7739564eb6

    SHA512

    391ae18123e1b6f8ad7e175798bf150c1701cfed5546ac919ac43bbe65026065e6cf749131e768485918dd1c52bce6c14c6a14c57830a50e840bc986b48bcab2

  • C:\Users\Admin\AppData\Local\Temp\89C0.tmp

    Filesize

    1KB

    MD5

    65f67dc9846002c0624ef8b7be949bae

    SHA1

    24122f46b51592d89ff97c1ed3037e6b1f7b4f13

    SHA256

    87fa45508bb74aa41fe7db2a9b5a30ce36df2fdf8896baf7bf171189e549e851

    SHA512

    1029945159eac2450eed782373672de7c6d775647e385bc75be658ae6f3ceb141a037b001bf94f2c7749e52f1100d9415dc9b47aad47b1d53ae56060cd6857e9

  • C:\Users\Admin\AppData\Local\Temp\BF04.tmp

    Filesize

    1KB

    MD5

    65dd9ce0d2934736565bd0bc6e9c664f

    SHA1

    d84f47a78915fd0e58c40c3ad8ee7b3423be2a4d

    SHA256

    5986efec7f556373c89218c4bd1ec0a5031d224eb826126194e1fcc711fc460f

    SHA512

    9290f287456a287b54b5ef5a3dc9d81ead593b8c10e82c132f1c5f0afa217ba9b572052f005210753a8535e12c2e66434da56c6f71946dca24c5e6bc4530be0f

  • C:\Users\Admin\AppData\Local\Temp\D9F.tmp

    Filesize

    1KB

    MD5

    76a6632742e09b2565d7547b89bf6deb

    SHA1

    493ec54f1f38a8d1922ba4e694958cf7b2874d73

    SHA256

    2364b5d26b9df9b8274bda89759e01793b58c914907de45a508f07fa5b7210ab

    SHA512

    a6905aab663cd8aa5c06ddfa599236d735e10d6c5e472686d155c55e2bb36e843601f7a5dfde3deef7cb4a55238bae290aa326dc1dd38a002d87165f05e6b0c2

  • \Windows\AppPatch\svchost.exe

    Filesize

    204KB

    MD5

    96b3faca8d6643d17b431f7bd724b95d

    SHA1

    35954872b66e1fe78f2661e40445640bc8baa4d8

    SHA256

    115cdeb3ea4259bd724c9cc6d8b72a08d640db00aec046bcf18a68800b1a707c

    SHA512

    81aabdf1a670bf4d5eeea9aba1df40d9ff966ae77040bedab537b906e5994962ac5e125e00d7c95b515de079db05404c715e54b1700c3efdf5e5a464db71b109

  • memory/1660-38-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-21-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1660-30-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/1660-33-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1660-69-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-26-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/1660-24-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/1660-22-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/1660-34-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-36-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-65-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-49-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-50-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-84-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-66-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-82-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-81-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-80-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-79-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-78-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-77-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-76-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-75-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-74-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-73-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-72-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-71-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1660-70-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-28-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/1660-16-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1660-83-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-67-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-64-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-63-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-62-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-61-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-60-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-59-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-58-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-57-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-56-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-55-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-54-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-53-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-52-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-51-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-48-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-47-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-46-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-45-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-44-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-68-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-43-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-42-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-41-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-40-0x0000000002930000-0x00000000029E6000-memory.dmp

    Filesize

    728KB

  • memory/1660-32-0x0000000002780000-0x0000000002828000-memory.dmp

    Filesize

    672KB

  • memory/2176-1-0x0000000000580000-0x00000000005D1000-memory.dmp

    Filesize

    324KB

  • memory/2176-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2176-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2176-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2176-19-0x0000000000580000-0x00000000005D1000-memory.dmp

    Filesize

    324KB

  • memory/2176-18-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB