Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 03:29

General

  • Target

    d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe

  • Size

    211KB

  • MD5

    09a8232b4699b81ec88ba00cb0c6aac7

  • SHA1

    d713d20abc8d0ed8894b45215732327f499f0c8c

  • SHA256

    d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112

  • SHA512

    c1e0d17ba0738a53f8b162ec5071ea745ea7a8bba170dc5dc3d9684659b518f36c2a395a41da0299711572dfbb5f04019f5f16b3323d98fa3dc5821d9366adeb

  • SSDEEP

    3072:lg/T01/NkSp48GzFoMVZrjB2+4M9eOpssvSX4FzU5chdhGulEV5SCmGFkInV/0at:WErGjVqiFPGYrGZMCrCIn6aQdM

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe
    "C:\Users\Admin\AppData\Local\Temp\d2bda65af2757a6ee977131296e1458d6242197dae75354de29fceff810c3112.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    211KB

    MD5

    46facd54253a14f0e02f4a9023ec0377

    SHA1

    e26621e408db021b3cb1ceee2c9d6520b8707ffb

    SHA256

    8b08e3560846bfb89ee713680a060a41edf9f88767b3fd125dc96eccca825154

    SHA512

    4b9d0dc3582b4e4f55e41c479a68a70bb720ee5018e1983df2f31df9503efda3a0166a8bdbe0468b03f2ea3b6caab7e2aca8f159dcb07ff479875f4ac05386a5

  • memory/308-0-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/308-1-0x0000000000330000-0x0000000000382000-memory.dmp

    Filesize

    328KB

  • memory/308-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/308-20-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/308-19-0x0000000000330000-0x0000000000382000-memory.dmp

    Filesize

    328KB

  • memory/308-18-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2740-21-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2740-22-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2740-23-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2740-26-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-34-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-32-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-35-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2740-30-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-28-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-24-0x0000000002110000-0x00000000021BA000-memory.dmp

    Filesize

    680KB

  • memory/2740-36-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-38-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-40-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-43-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-50-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-83-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-86-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-85-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-82-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-81-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-80-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-79-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-78-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-77-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-76-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-75-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-74-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-73-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-72-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-71-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-70-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-69-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-68-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-67-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-65-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-64-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-63-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-62-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-61-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-60-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-59-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-58-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-57-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-56-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-55-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-54-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-53-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-52-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-51-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-84-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-49-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-48-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-47-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-46-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-45-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-66-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-44-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB

  • memory/2740-42-0x0000000002230000-0x00000000022E7000-memory.dmp

    Filesize

    732KB