Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 15:21

General

  • Target

    03ede6eddb45e208a383d9b6eea037f0N.exe

  • Size

    29KB

  • MD5

    03ede6eddb45e208a383d9b6eea037f0

  • SHA1

    24551f1c1e60c927d2de02455d486a2b34a75b87

  • SHA256

    7404bddc81ccde6e70d49d3c6482abf622b4659654d8bd8c14098512c02702fe

  • SHA512

    13f8be02ecd0ec2bba026e8783b37a6196ecf0b0f9e7a7ecdd4b7338ab4c23166fec53a58c50018a3937b667c819f529eec97c165412c2c87f3ea32712829428

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Gi:AEwVs+0jNDY1qi/qei

Malware Config

Signatures

  • Detects MyDoom family 6 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03ede6eddb45e208a383d9b6eea037f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\03ede6eddb45e208a383d9b6eea037f0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IFM58U6K\ATRZDJSW.htm

          Filesize

          178KB

          MD5

          7532c682db6600608c135c1d103946f7

          SHA1

          7495e02046c95fd10f09deefab56a90406aba73c

          SHA256

          785aff7f05e5b72f4f78ef648b07807a281a41bae096db84194145d017d5c825

          SHA512

          bdef528d37a8480683f8fef0e09a1f55591c033be3ea71b37b5e919508338cf3c4b17aa228804657a21f981f3e8415d2f0f52896ea88436f318d03a9873d5f35

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LNHEOAK4\search[2].htm

          Filesize

          25B

          MD5

          8ba61a16b71609a08bfa35bc213fce49

          SHA1

          8374dddcc6b2ede14b0ea00a5870a11b57ced33f

          SHA256

          6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

          SHA512

          5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

        • C:\Users\Admin\AppData\Local\Temp\tmp923B.tmp

          Filesize

          29KB

          MD5

          11afa8f76cfd975be1980f606f41d6de

          SHA1

          8cd9a8e5bf0d44fb0e9b7cbe25a1f5d09c45cd1e

          SHA256

          b30637244d1fc5a4dd94b6362454ffe733d62d37450e82a3cbb24245b8d290bf

          SHA512

          326b8eb5b781bdd42cb1643907620c1e37d6aab8dcc4a45cc822aabd92c157f19c93051997568ac8d4f188196c9c0925b94058817c15677c6b49d1222f424e3c

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          384B

          MD5

          9db5e3e7257afcf10eccf5f00406b1b5

          SHA1

          bc86c1e5afc93ed4d2cf3a352aa2416b915281cb

          SHA256

          fc2eff970d048133db19a997e5c3146dad1bb7eca3dc58c6dd6522d2f54f0d58

          SHA512

          3a452326b3c79eae843acbaf951a5e5f4b628cb6bce9ea7b525cafc20a031cebfffbd31404178a1d46bb7a526e79acc3791b8c46c9ce972316e32c9c0d00affd

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          384B

          MD5

          df2bcc9f3f37169a7e4349a22c2e805b

          SHA1

          d3ff3660f37562d6ca62ddba67e4e27a6863437d

          SHA256

          1d94772f3e121e438c413818636a9d3e929efa396e6912cf24758b4dfed6a214

          SHA512

          dc9894a47546a54665085b3ae46213386c21751940cf43dcd7f51813c78ba8e129c93ff99ce0cf56b10becf0badb0d454a10cc795c3ba0bc0740e8f89840cb99

        • C:\Users\Admin\AppData\Local\Temp\zincite.log

          Filesize

          384B

          MD5

          8403a3a2b39164a70ce12c2938bf7faa

          SHA1

          7d8f512779ab8daba67d33e1d4afe3afd1326cdc

          SHA256

          797335667704915e0699094d31140a3ba709215705293c3632149f6b6d0bcfbd

          SHA512

          a8254aecc4b6d619883546ce60d35ff2e5a483b04aad5dac7f01b20518ca8d4b32b776afd95bcf5d7146a92f132687b8ca25b66914b7b708cc0ea7fa4be25319

        • C:\Windows\services.exe

          Filesize

          8KB

          MD5

          b0fe74719b1b647e2056641931907f4a

          SHA1

          e858c206d2d1542a79936cb00d85da853bfc95e2

          SHA256

          bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

          SHA512

          9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

        • memory/316-159-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-152-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-148-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-13-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-37-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-39-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/316-0-0x0000000000500000-0x0000000000510200-memory.dmp

          Filesize

          64KB

        • memory/2780-40-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-38-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-33-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-28-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-149-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-26-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-153-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-155-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-21-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-160-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-16-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-15-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2780-7-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB