Analysis

  • max time kernel
    113s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 08:51

General

  • Target

    54f40ed433f4b70aa5986047ac86884145bf6b28c0f8f4bda3db0bd310360b29.exe

  • Size

    212KB

  • MD5

    d3ac1033452e9a0e5bf6dd3989ddc05e

  • SHA1

    c4089a8245453b8d6b561526ea03baf6343333ed

  • SHA256

    54f40ed433f4b70aa5986047ac86884145bf6b28c0f8f4bda3db0bd310360b29

  • SHA512

    33bdb585712e72aef2ffe9179382cbdd1bf23d7e578a3f35540b599b013eb19e846985ee62569870e145c7bef23616474791494d7754b295d76d3a8f871f967e

  • SSDEEP

    6144:Lob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4GZ:MboEj/8ASWM4Ki96/zqIKGZ

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54f40ed433f4b70aa5986047ac86884145bf6b28c0f8f4bda3db0bd310360b29.exe
    "C:\Users\Admin\AppData\Local\Temp\54f40ed433f4b70aa5986047ac86884145bf6b28c0f8f4bda3db0bd310360b29.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3FC6.tmp

    Filesize

    42KB

    MD5

    98787afb312a993d0980b8fdf27fe4eb

    SHA1

    bdf982b59f931eabc1415d8a7baf7d104db16a48

    SHA256

    1317ffce7344d03e10642469ba98dd8e192d93e5ba6ce2e5b2ce5c87fd19aaae

    SHA512

    5bf50554daaba4a25e0ca5f6bcbe878378da8d0ac9843b89cb325a5ac7ad91dccb24dfab7d6b090e725e129e5e64a097c6cbf8e6a8abaafe1e2fe4c1cf42bc99

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    212KB

    MD5

    560f97feb0a5e14706a7d4a0ba569179

    SHA1

    80eb917cf840e5a4f38d5f2fafdc72bd72491dcd

    SHA256

    87686e8a4555dd5da81821d37221540c366b6c3ff5401ce2b6bbc297a365ceb7

    SHA512

    f03c0b9e4bd96078e6f15447778fb8ff01116e24df58c766e46b0f92deb4fa89fbcd5b7f2b23a6d52d92573e07499e962e95e5b47ac4fdbd5e7dace533d5463c

  • memory/2060-68-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-24-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-22-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-20-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2060-67-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-30-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-32-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-28-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-33-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2060-26-0x0000000002040000-0x00000000020E8000-memory.dmp

    Filesize

    672KB

  • memory/2060-66-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-34-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-36-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-38-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-50-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-56-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-84-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-83-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-81-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-79-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-80-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-77-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-76-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-75-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-74-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-73-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-72-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-71-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-70-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-69-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-41-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-19-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2060-21-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2060-65-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-64-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-63-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-62-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-61-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-60-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-59-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-58-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-57-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-55-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-54-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-53-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-52-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-51-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-49-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-48-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-82-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-47-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-78-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-46-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-45-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-43-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-42-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-40-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2060-44-0x0000000002550000-0x0000000002606000-memory.dmp

    Filesize

    728KB

  • memory/2864-15-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2864-1-0x0000000000290000-0x00000000002E1000-memory.dmp

    Filesize

    324KB

  • memory/2864-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2864-0-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/2864-17-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2864-16-0x0000000000290000-0x00000000002E1000-memory.dmp

    Filesize

    324KB