Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2025, 21:36

General

  • Target

    04e45f558869590927ff9351519f3589f3d06856376e274e708d78e434caca47.exe

  • Size

    213KB

  • MD5

    3f3b2748c4eecd51d87187343458662d

  • SHA1

    09a6d086deb806bb11e595c44d9d2c922594af90

  • SHA256

    04e45f558869590927ff9351519f3589f3d06856376e274e708d78e434caca47

  • SHA512

    cda8db4aae7d20edc5f6eaa620c912b6ce6b823b8b8069da648f8f09e4a3428f0d2be44b8ebc84466999e020764868f970a44de39cad97502305cafc88449242

  • SSDEEP

    6144:oQfbXnEreyARNf+fIfvEEDi3EJ3FzbPotDy6:3Xkej+f4VDOEVdbgt/

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04e45f558869590927ff9351519f3589f3d06856376e274e708d78e434caca47.exe
    "C:\Users\Admin\AppData\Local\Temp\04e45f558869590927ff9351519f3589f3d06856376e274e708d78e434caca47.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B1DE.tmp

    Filesize

    24KB

    MD5

    a8fc816240c29cd6cd3c1b0da967ba72

    SHA1

    011518ff7f5cc1dcd47d2205e86e76844e5a2a14

    SHA256

    280c0d185cb7157c49546198869e4e2beca5814c9f704561599e5c41c055ebe4

    SHA512

    6d99f82468cdb0b08632835145909d4f8395cd6671ae4f0e27ba5c8c50aba017a16808377ddb17408c43eaa2f02bc824ac87047216f7908a40cc853c29592196

  • C:\Users\Admin\AppData\Local\Temp\B1FE.tmp

    Filesize

    61KB

    MD5

    f30535e40a63274c23ed5ebcbf7b4b6d

    SHA1

    1f0f20a41979822a5bbc9120e6c3c237f1773f7c

    SHA256

    8d2b8040bfa5784e906b9fdb92157010b1683521a0efe3f74857273589ecf259

    SHA512

    386636243526392dcaad4d99416b2c24f17bef42ca3a0bf98b0870f6a4289ccbc98d737db836d6d3212105f198f052691da3620e8d7de8e976bdc9e29e9336f4

  • C:\Users\Admin\AppData\Local\Temp\B2ED.tmp

    Filesize

    481B

    MD5

    bddc81160838e4d94d47acfbd1559f47

    SHA1

    76c5ddaf9b480b0e3ad38dd2ee94bcdd39637891

    SHA256

    358b696656aa9f351e87b5ea0413d9d955bcd50cb6490a463027b15de42dde1e

    SHA512

    1faf5d7e69fcbd53810fbb5f615b5398b2fea40c8df98b361e14dcd4ff4f2fbb608d205c4d24eb281cdbd2fbe27ce1a854ece1bf8effab4910ae0018cf63388b

  • C:\Windows\apppatch\svchost.exe

    Filesize

    213KB

    MD5

    034e3d112ef096a65747acf4f213a116

    SHA1

    3ebc72f64189415989788f3b479473eae9df274e

    SHA256

    dfa1fea48439d1055a0f33b3a0a1307ce1840b267cef0db9d03dc349e1a77698

    SHA512

    90ba08f73732c4bf2945750c932d2fef40e3569f0cd60d50498dde2fe398815409b3911b7044bb0dce789916c657ca3b943f286bd2350b2781f71aaa1563ebb3

  • memory/2604-56-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-53-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-16-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/2604-31-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-12-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/2604-24-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-22-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-20-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-61-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-67-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-79-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-78-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-77-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-76-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-75-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-74-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-73-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-72-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-18-0x0000000002C00000-0x0000000002CA8000-memory.dmp

    Filesize

    672KB

  • memory/2604-71-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-70-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-69-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-17-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/2604-68-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-66-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-65-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-63-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-62-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-60-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-59-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-58-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-57-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-19-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/2604-36-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-27-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-55-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-52-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-51-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-50-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-48-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-47-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-46-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-45-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-43-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-42-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-41-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-40-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-39-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-38-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-37-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-35-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-34-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-33-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-32-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-29-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-30-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-28-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-54-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-26-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-25-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-49-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/2604-44-0x0000000002DF0000-0x0000000002EA6000-memory.dmp

    Filesize

    728KB

  • memory/3908-0-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/3908-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3908-1-0x0000000002400000-0x0000000002451000-memory.dmp

    Filesize

    324KB

  • memory/3908-15-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3908-14-0x0000000002400000-0x0000000002451000-memory.dmp

    Filesize

    324KB

  • memory/3908-13-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB