Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 14:18

General

  • Target

    16220040ee6f1dd5e69a0c8bbc21649caec349c6fcf8ee61df7d75ec55cbd72c.exe

  • Size

    218KB

  • MD5

    eb80e739055bbbfdf5dd5e01566a9b1b

  • SHA1

    97b4a1e6fa94901519d693f42b01986dcfc2ce8e

  • SHA256

    16220040ee6f1dd5e69a0c8bbc21649caec349c6fcf8ee61df7d75ec55cbd72c

  • SHA512

    926f5f9b07c8c909e4c4b23144e320af4fd06c2f4810f52157ad9c7964490a4e616ef688ccd2e99e83142531dc6f8281f07b78081aa710d553adcdbb088e9f5b

  • SSDEEP

    6144:LEQBDdO1z7L/EIhZDE9oLfFWlMZT7+DGaMwICW:LEGDdQNHEwWlMxYG/wIx

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16220040ee6f1dd5e69a0c8bbc21649caec349c6fcf8ee61df7d75ec55cbd72c.exe
    "C:\Users\Admin\AppData\Local\Temp\16220040ee6f1dd5e69a0c8bbc21649caec349c6fcf8ee61df7d75ec55cbd72c.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2DED.tmp

    Filesize

    42KB

    MD5

    b7645f3f47cb204bea9f25e77a1240ac

    SHA1

    853fd002adf886eaaf8c1ccdb85a955cc9339751

    SHA256

    8cea5b2eb23eed2dad34f26ae8a2fd042230dac4d342c7cca9cac0cdb39cf1b5

    SHA512

    f09411480af0a89fae37e2f5a030e2135e237d208031166abf379959d07e5bd16cae13a3830ec7f54f4aa7dbbc8e8ab59f1982667089b5fbec08e220e85c18b4

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    218KB

    MD5

    3afa71eb8c3e734460f85df7b96dc46e

    SHA1

    fcaa5d594f60f3dda2a9ddb60883cf029acfccba

    SHA256

    aee4671c9d04feb00822f59f231763cfb5e4ede227c0d560e65ef59e0b3c5b49

    SHA512

    b2e5dc8973fd091057111494a6e593b53fb541e844e47b73fd80c5e4a2391af15bba0f9da2528d3649f2ee79e59382f471673ab6a3737358d5fe7e760bbc4b65

  • memory/2072-72-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-69-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-22-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-19-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2072-51-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-41-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-42-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-26-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-32-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-30-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-33-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2072-28-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-24-0x00000000006D0000-0x0000000000778000-memory.dmp

    Filesize

    672KB

  • memory/2072-34-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-38-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-36-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-40-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-43-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-77-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-84-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-83-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-82-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-81-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-80-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-79-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-78-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-76-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-75-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-74-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-73-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-21-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2072-20-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/2072-62-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-71-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-68-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-67-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-66-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-65-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-64-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-63-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-70-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-61-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-60-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-59-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-58-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-57-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-56-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-55-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-54-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-53-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-52-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-50-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-49-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-48-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-47-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-46-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-45-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/2072-44-0x00000000026F0000-0x00000000027A6000-memory.dmp

    Filesize

    728KB

  • memory/3040-18-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3040-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3040-0-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/3040-1-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/3040-17-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/3040-16-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB