Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2025, 22:37

General

  • Target

    935f7046419595211f30a933b103da80e6b7c0d6728fa121f17426a13aec64ec.exe

  • Size

    208KB

  • MD5

    19ec7aeaf821b7e4668a914ba1947b7c

  • SHA1

    c1a69b5a68842c87f53ffbf924e399fd93b95eae

  • SHA256

    935f7046419595211f30a933b103da80e6b7c0d6728fa121f17426a13aec64ec

  • SHA512

    520dac4acf892983da7495ea20d538b7ce0538e969e70b75c6974bbfa8b49f365c9972ebf66e18a9030a753e7c9cbc8d12464de3fd1417249550bbcdfbb0d4e2

  • SSDEEP

    6144:ra1oB/yvpK0JCmRcRRR8N0e2kXfCqNidkfkg:rbapK0JCmRcU9vVokfR

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\935f7046419595211f30a933b103da80e6b7c0d6728fa121f17426a13aec64ec.exe
    "C:\Users\Admin\AppData\Local\Temp\935f7046419595211f30a933b103da80e6b7c0d6728fa121f17426a13aec64ec.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DD02.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\EC2E.tmp

    Filesize

    61KB

    MD5

    6d56a0f80d420435f082616f72b80102

    SHA1

    968c50136510eba7e04c35f3aa0268f15dd27846

    SHA256

    663caf4bb6ddebce64de0207f2215a0e2f0de0185ba22154ccd2e6730031c612

    SHA512

    7b549242e76f31fa5dc578e246fa5651ea08959f75393a94cb00f3495d9ea6d609b39b0c2defceaed9822f0f8c22e5e90c4984a9c2ab5876904610d0f60bc55c

  • C:\Users\Admin\AppData\Local\Temp\EC7E.tmp

    Filesize

    41KB

    MD5

    25634b4151cd4ad5a360b55fbe75b368

    SHA1

    601a63cfd44aa5800954219808bfaac6832cfe76

    SHA256

    09f9186acfcd1b33ae0901fcda0da4f1bc4de6da5f87bac221f95e92a003c2fc

    SHA512

    5a0314f84203ffb4d432f54665548c317220b02564080e30f024ce336392033dd78869fc47fd097769235e649c9daa5908c3d28fcf7ccfa6238f18a5a8927c40

  • C:\Users\Admin\AppData\Local\Temp\EC7E.tmp

    Filesize

    41KB

    MD5

    9f91ab0be5ee97952815365168966490

    SHA1

    3e403d641776bc6c28ebb3eec40a601867228c9e

    SHA256

    502de2a21486199bc5af53d15dc14fa1cdf05f05d520a0a9dfd28a07594f3ff6

    SHA512

    edad6cfa9c9d2e77c979f9c5adafc7a3d2d686f051a749c4493ddacbc968bef9cddb6d58fe521f246aa9d478d4eed1a802ad0b662f5e4198ffbabf68c25aa2e2

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    1604386f030e7e29090ec6c84dc78361

    SHA1

    9a09eaf383f270444a41867ad68e3ad7abdb5c4d

    SHA256

    dd5eeb260d2456b57e6cd7c8fdbb9ce2c53d33b75ddd1a55104a6730037ae0b3

    SHA512

    e91fb78bf26671fe367beeba8d43c671e7262406447895872ab8a758ae1d1df23f303ca09fb3cca6b57b166c7402418d69d03f5e6073d462d0a32a4792fc4cb6

  • memory/2044-53-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-49-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-22-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-20-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-23-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-24-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-79-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-78-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-77-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-76-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-75-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-74-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-73-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-72-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-71-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-70-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-69-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-68-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-67-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-66-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-65-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-64-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-62-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-61-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-60-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-59-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-58-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-57-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-56-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-55-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-54-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-14-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2044-52-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-48-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-18-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-50-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-51-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-47-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-46-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-44-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-43-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-42-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-41-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-40-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-39-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-38-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-37-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-36-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-34-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-33-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-32-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-31-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-30-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-29-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-28-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-27-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-26-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-25-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-63-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-45-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-35-0x0000000002BB0000-0x0000000002C66000-memory.dmp

    Filesize

    728KB

  • memory/2044-17-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2044-16-0x0000000002A00000-0x0000000002AA8000-memory.dmp

    Filesize

    672KB

  • memory/2044-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3012-0-0x00000000004C0000-0x00000000004C3000-memory.dmp

    Filesize

    12KB

  • memory/3012-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3012-12-0x00000000004C0000-0x00000000004C3000-memory.dmp

    Filesize

    12KB

  • memory/3012-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3012-11-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB