Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 04:59

General

  • Target

    39b5dd36dc632eb90619aea4e4d1c5d526531f6db151c3ce5538e1d56020c3e5N.exe

  • Size

    355KB

  • MD5

    71990b92df7a81894ec4562c1247db50

  • SHA1

    fc97d5efb184e5d870b1deecea3b00c6d706dc63

  • SHA256

    39b5dd36dc632eb90619aea4e4d1c5d526531f6db151c3ce5538e1d56020c3e5

  • SHA512

    8fc6892e733dc04908cb743eb39b1b8f08f7c4f13242a297b0d983a69509cb905ea16088189f809d170ee20a55e46b011eae74bb22d94fd593e904880dcc2a7c

  • SSDEEP

    6144:UgEmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei:2mWhND9yJz+b1FcMLmp2ATTSsd

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39b5dd36dc632eb90619aea4e4d1c5d526531f6db151c3ce5538e1d56020c3e5N.exe
    "C:\Users\Admin\AppData\Local\Temp\39b5dd36dc632eb90619aea4e4d1c5d526531f6db151c3ce5538e1d56020c3e5N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EFY08QA2\login[4].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\3DB6.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\4B66.tmp

    Filesize

    61KB

    MD5

    80b787a1416d959c879eef2330b75cec

    SHA1

    063b90a5776da34626259cbbf91534fbb7e1d621

    SHA256

    1a445be3fd5efe5192c4db5fe0635affb9454594b0d8200c873315d54a5f5831

    SHA512

    420d89f99ea6153928c42a4e4ea2ba134c3b197d0e01144b922cbfc1b64ff36eec4476ba0997d02bc145ecfbf7fda2542f5f08a9c5ebdc615fc29d747e51b1b0

  • C:\Users\Admin\AppData\Local\Temp\4B78.tmp

    Filesize

    42KB

    MD5

    40ac9a6206a48fa0189a38370d1a8ba5

    SHA1

    ae4bb2570ca7496b85304676b79c4e007d6d9dac

    SHA256

    b9818b38464eee380d8a6133c30edc6da313f4624bd75a4bfe11b92483821af8

    SHA512

    20b96bd2080ec8c3c1d8269437f2d7f0cc56e90631e4b11daa38b14d208a405c351997bfa6f8d89334304d48f2bba6ea2725297efb23872ffd7da4933f2ebfea

  • C:\Users\Admin\AppData\Local\Temp\4B78.tmp

    Filesize

    42KB

    MD5

    2b93a4fc005b788efe1b743c2889120d

    SHA1

    3e4a1bd9f179326fb33b44b6fceef99296aab508

    SHA256

    97566e769c282a77a44106146e37825dd22a055f879b47ceb122bfc1b7e6f8ba

    SHA512

    f1352609760441115f8511f5a60b617b5c809160594112d3cdcda3b03a37214421ab035712050006095ce4a6aa16a2ebf7e40d686a5b80381ce19ab05c166b5e

  • C:\Users\Admin\AppData\Local\Temp\4BEC.tmp

    Filesize

    1KB

    MD5

    ec9a5015d56837a719c34315670b4ff5

    SHA1

    95c47de8abd7b76b0684c781fd1ebd2bc7cc4876

    SHA256

    57ca8b53f140ba5f4dba162b0182711dea28b66e049ea69188bb1ff73cae3182

    SHA512

    8938b61ea96aaee2edbc1092124ad7de02b2fbfa7d2278146d6a765f7bfba0bda75befcead75b6da2fe2fa09cb7addd3c471ab8084e1afafd3156003bfe699a8

  • C:\Users\Admin\AppData\Local\Temp\5A75.tmp

    Filesize

    1KB

    MD5

    19f0d6561a3a154f19d246cce2464137

    SHA1

    f7a0ab0960bd13d3e26635acdc5a31e8335966e5

    SHA256

    435a07967880bf57dcb44dd9c253b11ab65d3cc256ba3241ec90f8d6b6dedb51

    SHA512

    4ab67c42a189e41fd0eb23afa76458bcb84cb978f33ebac2a383e403c67a0a7f30b847ccba73f9b0cd12cfe4a2a2bbb0b377eeef1dbda7f66408c69bf62b7b97

  • C:\Users\Admin\AppData\Local\Temp\5A86.tmp

    Filesize

    24KB

    MD5

    25f041a2f4154e499b90ba605cc55e01

    SHA1

    b91c3861b60142764f571ec7269a594aa24862fc

    SHA256

    115b9f25d70eb4f06f7efc81a74f2717e8c875a3201ebd15b8388f593870acac

    SHA512

    7d5a545d9ac52e27ed2523f7acec24c1c28e5cf302538640a5736f93e74cc8d69f9890105dc3f571cd7aa8599bc35a3c2b2ae1a04b462642086d4bf11401910d

  • C:\Windows\apppatch\svchost.exe

    Filesize

    355KB

    MD5

    73ce426ff44f6df6666b036e0e1ae791

    SHA1

    d5e931df906941b38e1a5f63e9fff3505326c450

    SHA256

    d571b03cd9312f6a2490f6872bf13d68436c3b1f2432a6029a9432bbf608115c

    SHA512

    35cae4fe525851457e9c6449d67a330bc86347705b8692bada66e48074986523228f3cf5de224d8bf3f0ad7f85b2f4529846be8348bfd3c2624a55649a7ecf67

  • memory/220-9-0x0000000000C80000-0x0000000000CDF000-memory.dmp

    Filesize

    380KB

  • memory/1500-38-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-30-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-72-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-71-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-69-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-68-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-66-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-65-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-63-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-62-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-59-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-58-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-56-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-55-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-54-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-52-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-51-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-49-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-48-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-47-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-46-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-44-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-42-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-43-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-41-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-40-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-39-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-37-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-35-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-33-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-32-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-60-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-29-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-27-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-25-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-24-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-22-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-21-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-73-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-70-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-67-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-64-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-61-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-57-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-53-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-50-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-45-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-36-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-34-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-31-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-28-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-26-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-23-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-20-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-19-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-18-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-12-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-14-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-16-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-11-0x00000000032B0000-0x0000000003358000-memory.dmp

    Filesize

    672KB

  • memory/1500-17-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB

  • memory/1500-183-0x0000000003700000-0x00000000037B6000-memory.dmp

    Filesize

    728KB