Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 09:37

General

  • Target

    484ee81b8654436097aa078df2c41b1e97a5d2cfcf36778e689c86ffa5e724ba.exe

  • Size

    204KB

  • MD5

    b120ffcb06669af04e67d5cfd41e1fba

  • SHA1

    56deea35d2bf86f5fc976e4ca356e8c18702a921

  • SHA256

    484ee81b8654436097aa078df2c41b1e97a5d2cfcf36778e689c86ffa5e724ba

  • SHA512

    2c4141bee4a85aef26aef62c695fd6aa6b5886119919e0b440c7f0471afc0e91ab65a180ad487a2af40097cf7dca49ff2adcb2cd3af85f239bbe87a01a347964

  • SSDEEP

    3072:m5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlA4:mLexkuRaX41xoyJV65gzyZko+uc7

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\484ee81b8654436097aa078df2c41b1e97a5d2cfcf36778e689c86ffa5e724ba.exe
    "C:\Users\Admin\AppData\Local\Temp\484ee81b8654436097aa078df2c41b1e97a5d2cfcf36778e689c86ffa5e724ba.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6416.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\B388.tmp

    Filesize

    24KB

    MD5

    63435d2f8b74defaff7fd9ac959bec33

    SHA1

    d49b3a69220bbace12b72284c494b71edc14124b

    SHA256

    ef306fd4114d60c009b5c6bd958210f185203a2a6e7ed766c802f66d08dfb9c7

    SHA512

    bc1fed51c7661104e036ca06fdbd2e1e92351fb1d193531860fb149c4a170fccfef62ebfe351e8f2c03ca109637ab581bb6680b42a69ba869208c2c5b41f014f

  • C:\Users\Admin\AppData\Local\Temp\B3DD.tmp

    Filesize

    1KB

    MD5

    657eacf5d5911d547acd5e093b54f48c

    SHA1

    9301a9782d227ab2a579fbef7799f2cb0a0a8341

    SHA256

    495efbd72d0bb05d29a1f118231c07c70cb4124970a2e55c3a69b909d93fc6f3

    SHA512

    e633e242fcf48ab5538793da67ded951e9de99cadf6f4908d607eec133fc254a929edbbe94d6a14d20a051d04cbe1c39ae5fd3eba2dfdbde0d8878df1969d794

  • C:\Users\Admin\AppData\Local\Temp\B3FE.tmp

    Filesize

    42KB

    MD5

    6883106ab615fbdd5fb360d00ed676bc

    SHA1

    545ae9fede74837f0aca36bcba1f614b12f20e94

    SHA256

    eeaa55a4ab00e13b1b8dba229fb4dd05192c36dd05989c3febeed5d2a6a62a22

    SHA512

    3a705d27580af820db0330807de1d6a6257690de390a8f8f6f83e9d44243132ce595482795e396479b961efcf9df5b05daaf2370dd4132ad6388592c6f525c94

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    204KB

    MD5

    ce292c31a640c5beac1d77bd69150317

    SHA1

    9f0d7226069450ee4b72726c7fbe1db7b39f4dad

    SHA256

    8dc6f85296859b2a3ffc7c60471a445bdf836a96df814694edc05ef98d0badb1

    SHA512

    40ce4a37efbde1991bf9eb67c796743a443f3ce760e5871ce90989fdfda8e6f2081cc2f1ec1a4bf58e52fc988dbbf84213c7a770057bfb5557a4cf3b8c2f40f8

  • memory/1300-0-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1300-1-0x0000000000280000-0x00000000002D1000-memory.dmp

    Filesize

    324KB

  • memory/1300-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1300-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1300-19-0x0000000000280000-0x00000000002D1000-memory.dmp

    Filesize

    324KB

  • memory/1300-18-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-72-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-66-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-33-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-26-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-24-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-21-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-34-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-38-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-36-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-40-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-53-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-84-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-83-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-82-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-81-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-80-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-79-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-78-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-77-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-76-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-74-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-73-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-32-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-71-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-29-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-70-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-69-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-68-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-67-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-30-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-65-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-64-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-63-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-62-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-61-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-60-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-59-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-58-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-57-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-56-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-54-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-52-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-51-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-50-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-49-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-48-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-47-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-75-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-46-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-45-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-44-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-43-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-42-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-41-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-55-0x00000000028E0000-0x0000000002996000-memory.dmp

    Filesize

    728KB

  • memory/2440-22-0x0000000002730000-0x00000000027D8000-memory.dmp

    Filesize

    672KB

  • memory/2440-17-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-16-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB