Analysis

  • max time kernel
    131s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 21:08

General

  • Target

    2f743046f4ec2464ffb37aada1480a5057f5512e79e1f2bd93349ef5c7efe410.exe

  • Size

    1.7MB

  • MD5

    4257f51ce00e476ca75e7973996128cd

  • SHA1

    d6dd39786adbb5221a0e3683d368438f76f3bb97

  • SHA256

    2f743046f4ec2464ffb37aada1480a5057f5512e79e1f2bd93349ef5c7efe410

  • SHA512

    cc97e8870a1c9a0a2da72beaf3f8c0a80cbcea358748074725cd6988046ff64de412b89b7fbf63c44647ec30af23247376ea447239b5f30407987a748690f630

  • SSDEEP

    24576:DmUNJyJqb1FcMap2ATT5rmUNJyJqb1FcMap6mUNJyJqb1FcMap2ATT5rmUNJyJqG:DmV2AprmV6mV2AprmV6mV2AprmVG

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f743046f4ec2464ffb37aada1480a5057f5512e79e1f2bd93349ef5c7efe410.exe
    "C:\Users\Admin\AppData\Local\Temp\2f743046f4ec2464ffb37aada1480a5057f5512e79e1f2bd93349ef5c7efe410.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\787B.tmp

    Filesize

    24KB

    MD5

    ca9f6f64ee338e47f316d327e61d187a

    SHA1

    9d8bf1f1d40087bab1820c89468c57bcd9ffe1ce

    SHA256

    3255e3e6a001e091b72054e733b42b9680d08382a286a441aab52f5e7725bd31

    SHA512

    c0773c34aed0c83b74325204eed630aca51c4761d0478d30c5e5e29d1f2b656d769a8cffc1cd0a26a25ed8d9d7c091d014dce8d7a8f9e8c2026457a087874621

  • C:\Users\Admin\AppData\Local\Temp\78BD.tmp

    Filesize

    1KB

    MD5

    65062a20e30457efad9f45c221c0118e

    SHA1

    45fbdae648dd743e78b0eebcfdb0ce2aa83becce

    SHA256

    3517abce0081d61d5d6e9a1779c346afc169db2ea8d7c4f432c4726bf7f20012

    SHA512

    4db1b701d289feef1006f18838474cfaa2994d0c08641ac3c61503a76939183aa7f77c97634a6d76249da31075b40da50f2addb08ddb79e1cbb471d16220ad6e

  • C:\Users\Admin\AppData\Local\Temp\C621.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    1.7MB

    MD5

    8208f4bb5d43c66dc08403222e5762f6

    SHA1

    5cee7c06afb2c639ba34584e3519c990d2452224

    SHA256

    acf6a1b5948325baeb526226fdc0e413b4d3fe1702d8c0279e3239a8adbe0898

    SHA512

    5bbea32c73b9745ebb01f0d967bda455e8506f6839c5f6145bdfc9f34296a7671372e68383d6e13244b825ec56f5aca486812db4ebdb2c43974156acfa4f2a88

  • memory/1604-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2888-57-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-47-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-30-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-27-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-16-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2888-19-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2888-51-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-49-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-78-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-77-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-75-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-73-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-72-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-71-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-69-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-68-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-66-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-65-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-64-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-50-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-62-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-61-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-59-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-58-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-24-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2888-20-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2888-55-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-54-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-53-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-28-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-22-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2888-48-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-46-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-45-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-41-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-40-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-76-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-39-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-38-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-37-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-36-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-74-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-35-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-70-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-67-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-34-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-33-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-32-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-63-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-60-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-56-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-52-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-44-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-42-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-43-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-200-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2888-14-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB