Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 21:02

General

  • Target

    0e3d80c9ebf3a33fb3aaad78b7916c3f033fa17983c407b07f995a13b16d8cd4N.exe

  • Size

    355KB

  • MD5

    9963e7835ab552c320d704693c5f3be0

  • SHA1

    47e4f3eaf0971ab268c6ee476ee78e633f30c959

  • SHA256

    0e3d80c9ebf3a33fb3aaad78b7916c3f033fa17983c407b07f995a13b16d8cd4

  • SHA512

    e78f26c29d119dec00f73945a2ee0fd639fb9966727506103a76c3213b7024119eca4180fe9f551a5fc86149b276a99aa337634d48584990288447cd30ed3fbd

  • SSDEEP

    6144:5gEmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei:fmWhND9yJz+b1FcMLmp2ATTSsd

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3d80c9ebf3a33fb3aaad78b7916c3f033fa17983c407b07f995a13b16d8cd4N.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3d80c9ebf3a33fb3aaad78b7916c3f033fa17983c407b07f995a13b16d8cd4N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B4EF.tmp

    Filesize

    42KB

    MD5

    6144c9f3efa178c34570b2c140f2eea6

    SHA1

    0f2e763b11321ba2bd0dcc235fd045b1d49ab19f

    SHA256

    ec88a43db36e7a45dadbcf807d8b2b00fe7aa2c31c7f72d727dd10e7c23a3470

    SHA512

    6ce27237d583f9a6ec3f0b03582a1e62c4c031fd71d45da74a68913964d8fefbd1fc9f290b56fee0f20b2ac8e9c412224bb71a8663fc106d514bc65f3752bc33

  • C:\Users\Admin\AppData\Local\Temp\B543.tmp

    Filesize

    1KB

    MD5

    21d09618e5cb27e3b6b2432e75e5bb6e

    SHA1

    cb79b47fd11bd64f9fa5a1e47c431e87e1358225

    SHA256

    1a742163c620c780e7d08f02c46cfc414f758ff9e3c0ab03fdd84cf4324ad11f

    SHA512

    e357038ef4b92a7df865579c3faab28e85dfae8675cb75a9b82d2cd3e4ee55301396edf0504136e83b0932c3545bf25d0ad4358cd1911a5bec042dfae2b450c7

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    355KB

    MD5

    8d6d51b056d90cb74922293c04b4e128

    SHA1

    50a26951111c77aaa6d15a5bb71f214c85313d45

    SHA256

    5243cd893fdbca50b70db17f86ccf7a4964b93ae750c0990efb79b1237b5bc10

    SHA512

    d13ee98371dab3d0366af9ce5d89c82fa75d8a4d7c046f62932ec0f96710a871854dc11f622e01a53a3cfb59221d72c6b5400ba7ddc804b4ff98642c65394cca

  • memory/2368-14-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-24-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-22-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-20-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-18-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-16-0x0000000000160000-0x0000000000208000-memory.dmp

    Filesize

    672KB

  • memory/2368-25-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-30-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-27-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-34-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-40-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-78-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-76-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-75-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-74-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-73-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-72-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-71-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-70-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-69-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-68-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-67-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-66-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-64-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-63-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-62-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-61-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-60-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-59-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-58-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-57-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-56-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-55-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-54-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-52-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-51-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-50-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-49-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-48-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-47-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-46-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-45-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-44-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-43-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-41-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-77-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-39-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-38-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-37-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-36-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-35-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-65-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-32-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-53-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-42-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-33-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2368-203-0x0000000000DA0000-0x0000000000E56000-memory.dmp

    Filesize

    728KB

  • memory/2404-12-0x0000000000FC0000-0x000000000101F000-memory.dmp

    Filesize

    380KB