Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 09:43

General

  • Target

    fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe

  • Size

    208KB

  • MD5

    2bc2b5ab3d83a5fda7afc48e24c91db7

  • SHA1

    92bc15258519e97a0b87431bc85d8a88ca2d8d1d

  • SHA256

    fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b

  • SHA512

    8ca4873f2d3aa0dfb2f37b5792e7851138c5ad594416de0e7140b34f33efa6e4835da5fce101d23d45e414c8f4058d04f9d51c5693bd08b6f2a938ef185526ef

  • SSDEEP

    6144:Qa1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfk:QbapK0JCmRcU9vVokf

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe
    "C:\Users\Admin\AppData\Local\Temp\fdb1b47d3f73104c5d791a7f8cb79c173e048fea569cdfa0efeae73cb0a33a3b.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\login[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Users\Admin\AppData\Local\Temp\3097.tmp

    Filesize

    12KB

    MD5

    caa300673c11a7627a7b6346e1a93b61

    SHA1

    7ecaf36f1e150c478b6cfc3446ec7f0c662c071a

    SHA256

    42ae110a0ecd0d83c4f12314d42a585354b501856dc3c7b483123fcbc317f2aa

    SHA512

    f11f1182d2fdc14b2c64e2221091e318f76c9a41824977c1a93bf2077300bba919ca4a01c80340c4c20d239ac6dbadf091f544891f0ec72df62a6cc11231faa6

  • C:\Users\Admin\AppData\Local\Temp\4967.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\9D2A.tmp

    Filesize

    1KB

    MD5

    e8e5ac186b657bcbb69d27bdfd28986a

    SHA1

    f715b98a81602cc1dc5e0c9ae036542900f2e5b4

    SHA256

    f3e77a80eb32edc8f05d8514c51fd60c119253eb92477be6d0f5510b18e7b35e

    SHA512

    a8484019a314e14b4c5a93534570271d9e9d1f4ec0b7059a578ecb3ffbd9db129f088978b66ba59f3dd07b2c0ae4659c30278110830275420837f718456e5271

  • C:\Users\Admin\AppData\Local\Temp\9D8A.tmp

    Filesize

    24KB

    MD5

    039fce9e2722221154769f7ccfb1aecd

    SHA1

    079df6602fbf4e49eba3523d89e73f86bf9f7ae0

    SHA256

    9af8ca89b0ca1f3db68f5d1171e669042835c5a25cc0eb64043e0c9b742db0c4

    SHA512

    389c5213de0b27406e73548363ac8e2d20c17e229070b642f46a038202464ed4865f853a7471f2b49224051a491305dc6bc0be0aa093f106fce8da0641692ade

  • C:\Users\Admin\AppData\Local\Temp\9D9D.tmp

    Filesize

    100KB

    MD5

    5aec8c031a99949ae139572b6c58855a

    SHA1

    3432a8bc0ffa557d75e179609feeef269b81086a

    SHA256

    7600f971770d19afc41b629828b7a0652373b47b4ed76c91b7314112d3ba1a7b

    SHA512

    275a70f484e85a9ef401fc3eabf8ad530c4c1fc7e739ae29a2799d28f43014b0261f20f889ffc1f6899b627bb9d0379a85215754ccf8d2cc758d221b78197dad

  • C:\Users\Admin\AppData\Local\Temp\BAE1.tmp

    Filesize

    1KB

    MD5

    6a68171eca266f725b7b1d8231900f33

    SHA1

    8dcb9a823a33b440a2d6002f02c057a9653bc4c2

    SHA256

    1d1abfa28ea6da62f07393f2fd447a64bd51baa545d946d14fe5b546eea3e8c8

    SHA512

    148c75282bfb4db7d32e4533e92cfec787e9963c1a546f48fd18622bb20ac9f23aa2235726233a9319a181b8bc2ef22ca8b91faa97c64cdab2011285a0f65e8f

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    2a58bca026bee449ebd0a406bf917110

    SHA1

    44188ee4f4be247d23636782e6941d04849d2727

    SHA256

    2004f2aaa41ad6d4236604e28a1e4a6abe61c196ab2bca62af262d36db89def8

    SHA512

    20a293823cf772c8dc1c11e96235ed973618cebc9dcd337ce58534539d37511ab7d27e63c36505c897443c60629f0166dfeea6d573e932be85f7736deafc0b57

  • memory/2380-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2380-11-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2380-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2380-12-0x00000000001D0000-0x00000000001D3000-memory.dmp

    Filesize

    12KB

  • memory/2380-0-0x00000000001D0000-0x00000000001D3000-memory.dmp

    Filesize

    12KB

  • memory/2872-69-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-63-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-23-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-22-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-19-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-17-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-29-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-33-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-31-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-43-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-45-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-81-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-80-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-79-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-78-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-77-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-76-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-75-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-74-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-73-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-72-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-71-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-70-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-25-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-68-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-67-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-66-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-65-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-64-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-28-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2872-62-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-61-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-60-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-59-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-58-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-56-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-55-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-54-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-53-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-52-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-51-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-50-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-49-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-48-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-47-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-46-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-44-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-42-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-41-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-40-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-39-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-38-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-37-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-36-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-27-0x0000000001D70000-0x0000000001E18000-memory.dmp

    Filesize

    672KB

  • memory/2872-16-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2872-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2872-57-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB

  • memory/2872-35-0x0000000002450000-0x0000000002506000-memory.dmp

    Filesize

    728KB