Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2025, 05:03

General

  • Target

    b40f986012577d6375de12a0eceb69292c455b4ca8706f161e96e7edd1e6090e.exe

  • Size

    686KB

  • MD5

    4e4f7eeee0f4c32360cac9e25c144b12

  • SHA1

    b09e055538189f30165c99cfa7318cbce59dd134

  • SHA256

    b40f986012577d6375de12a0eceb69292c455b4ca8706f161e96e7edd1e6090e

  • SHA512

    50be96b815a4c28e6cf22efa64a3edb5865329ec9cd546a369491da7bcaaffafce37d1d3d3f38117d5b79cc3ae48c385644cebbfb124a7326b593dd17a1a07ab

  • SSDEEP

    12288:RmWhND9yJz+b1FcMLmp2ATTSsdApVHyGbs2CYPHrLpVmCbHDSgp:RmUNJyJqb1FcMap2ATT5itjCYZ3DSo

Malware Config

Extracted

Family

simda

Attributes
  • dga

    gatyfus.com

    lyvyxor.com

    vojyqem.com

    qetyfuv.com

    puvyxil.com

    gahyqah.com

    lyryfyd.com

    vocyzit.com

    qegyqaq.com

    purydyv.com

    gacyzuz.com

    lygymoj.com

    vowydef.com

    qexylup.com

    pufymoq.com

    gaqydeb.com

    lyxylux.com

    vofymik.com

    qeqysag.com

    puzylyp.com

    gadyniw.com

    lymysan.com

    volykyc.com

    qedynul.com

    pumypog.com

    galykes.com

    lysynur.com

    vonypom.com

    qekykev.com

    pupybul.com

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b40f986012577d6375de12a0eceb69292c455b4ca8706f161e96e7edd1e6090e.exe
    "C:\Users\Admin\AppData\Local\Temp\b40f986012577d6375de12a0eceb69292c455b4ca8706f161e96e7edd1e6090e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\16EA.tmp

    Filesize

    42KB

    MD5

    5ded93be6dc13123799e2ac71841c07a

    SHA1

    fa3e755dd69be57e881a2b2b630cbb5f416787f4

    SHA256

    1e85817e418e7cc4cb607bb3c9a9110161eaeb924953613dc5026294e3ad60f2

    SHA512

    2b61a11947ffcbaae9f626584fe09afccc655200c9bbc9d2466dcbf5398d6bc1c839f3b95e26c6f15f5ab68e9b429d6edb7173b681220a1d78f3adc69fe0d76a

  • C:\Users\Admin\AppData\Local\Temp\16EB.tmp

    Filesize

    24KB

    MD5

    8cf23629067fc28902d950ce17b4320a

    SHA1

    e41ea9fdf84c87e05702f3d825fbe1df9914e749

    SHA256

    8bb8dd082a4c50027ae43f96bc83a25112336d2d914420ad034be1138dad160e

    SHA512

    7372cce94c7b76a598723d408e937a69bc160cf161bdadf74684bb37d3038ce21c76e2e743746249b0331cbe81ce205c848d101cbf6f52764e79ecd91001b654

  • C:\Users\Admin\AppData\Local\Temp\C1FC.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • \Windows\AppPatch\svchost.exe

    Filesize

    686KB

    MD5

    942e3972742e0c1a51eb142efe7deed7

    SHA1

    a069808e9cb5dfa4bc9f62067b98ca6bbba6dfe4

    SHA256

    a5e0a2b615ca1c7065e68d0d97fba0efe9886d634a3c73d85594f3aab789408e

    SHA512

    a24ca4df6f84045f0d0ee38446661c16aaeb850c9a3a033e6d01887031e31312b44ece64e142374277a7e3d1292db461eb38537c6ddbac01165071c474f1efcf

  • memory/2196-13-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2760-14-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-24-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-22-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-20-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-18-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-16-0x00000000021F0000-0x0000000002298000-memory.dmp

    Filesize

    672KB

  • memory/2760-25-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-27-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-29-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-38-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-37-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-55-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-77-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-75-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-74-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-73-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-72-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-71-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-70-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-69-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-68-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-67-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-66-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-65-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-64-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-63-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-62-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-61-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-60-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-58-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-57-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-56-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-54-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-53-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-52-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-51-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-50-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-49-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-48-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-47-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-46-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-44-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-76-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-43-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-42-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-41-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-40-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-39-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-59-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-36-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-35-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-34-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-45-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-31-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-33-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB

  • memory/2760-32-0x00000000023A0000-0x0000000002456000-memory.dmp

    Filesize

    728KB