Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Worm.Win32.Mydoom.26978.32046.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Worm.Win32.Mydoom.26978.32046.exe
Resource
win10v2004-20230220-en
General
-
Target
SecuriteInfo.com.Worm.Win32.Mydoom.26978.32046.exe
-
Size
1.4MB
-
MD5
2c00c1b1a4aaab8fd11e5e0434cd6464
-
SHA1
d6597ef0ea3c717e6ecfe44a43b571b78d896004
-
SHA256
9e079d96a55bd841a7dcddecb46aea0c6d96f3dcaab58c2a5516dd5c0205da22
-
SHA512
f4c5d8a496089079cd6b25448923858d51b3e805ab4741affa9088a92fe5e8f497b207611362cd899d6abea86298c7fd3e67f00537ad222594449eb434f2d032
-
SSDEEP
24576:4Aba1ntCz2e2ONzT3+vz1UP/z7oZJsHInp:4Acn3uX+vKP/z7oZGWp
Malware Config
Signatures
Files
-
SecuriteInfo.com.Worm.Win32.Mydoom.26978.32046.exe.exe windows x86
d0886828df4d85e6ba48751091ff2248
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
DbgPrint
KeInitializeEvent
ProbeForRead
MmSystemRangeStart
_except_handler3
_snwprintf
wcsstr
_wcsnicmp
MmIsAddressValid
wcslen
_wcslwr
ZwDeleteFile
IoFreeIrp
KeSetEvent
IoFreeMdl
MmUnlockPages
KeWaitForSingleObject
IoBuildAsynchronousFsdRequest
KeInitializeSpinLock
wcsrchr
MmUnmapLockedPages
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
IoAllocateMdl
_snprintf
qsort
RtlImageDirectoryEntryToData
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
strchr
RtlEqualUnicodeString
RtlInitAnsiString
_wcsicmp
ExInitializeResourceLite
MmGetSystemRoutineAddress
_stricmp
KeAddSystemServiceTable
PsSetCreateProcessNotifyRoutine
NtQuerySystemInformation
KeInsertQueueDpc
KeSetTargetProcessorDpc
KeInitializeDpc
ExAllocatePoolWithTag
KeEnterCriticalRegion
ZwEnumerateValueKey
ZwEnumerateKey
IoCreateDevice
ZwClose
ObReferenceObjectByHandle
ZwOpenKey
KeBugCheckEx
ZwUnmapViewOfSection
_allmul
KeGetCurrentThread
MmHighestUserAddress
ZwWriteFile
ZwCreateFile
swprintf
MmGetVirtualForPhysical
MmGetPhysicalAddress
ObOpenObjectByPointer
IoFreeWorkItem
IoQueueWorkItem
IoAllocateWorkItem
PsTerminateSystemThread
KeInsertQueueApc
KeInitializeApc
NtAllocateVirtualMemory
PsCreateSystemThread
ObOpenObjectByName
RtlValidSecurityDescriptor
RtlImageNtHeader
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
RtlVolumeDeviceToDosName
ZwYieldExecution
IoThreadToProcess
mbstowcs
IoBuildDeviceIoControlRequest
KeClearEvent
IoGetBaseFileSystemDeviceObject
IoGetDeviceObjectPointer
KeStackAttachProcess
KeUnstackDetachProcess
ZwQueryInformationFile
ZwOpenFile
ZwReadFile
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
KeLeaveCriticalRegion
KeDelayExecutionThread
ExDeleteResourceLite
ExFreePoolWithTag
IoDeleteSymbolicLink
ZwTerminateProcess
IoCreateSymbolicLink
IoDeleteDevice
IoGetCurrentProcess
ObfDereferenceObject
PsLookupProcessByProcessId
KeNumberProcessors
IofCompleteRequest
hal
ExReleaseFastMutex
KfAcquireSpinLock
KfLowerIrql
ExAcquireFastMutex
KfReleaseSpinLock
KeRaiseIrqlToDpcLevel
tdi.sys
TdiRegisterNetAddress
ndis.sys
NdisDeregisterProtocol
NdisOpenAdapter
NdisRegisterProtocol
classpnp.sys
ClassGetDescriptor
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp2 Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE