Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 19:40

General

  • Target

    0b40d8bd937a9daa41cf8274f82a1013b575b5cc20e95e8999f9e30eb401da9bN.exe

  • Size

    29KB

  • MD5

    fd71e9583301c4090d823cfb92c5d190

  • SHA1

    766bb41aa7740e457ab92dfe632de48d67a5d78c

  • SHA256

    0b40d8bd937a9daa41cf8274f82a1013b575b5cc20e95e8999f9e30eb401da9b

  • SHA512

    35ffc0faef6481046e459c1b951f251d527040ef7f52bce7f2019cff79abe2d0c654d769b5b00e9469e25f69362f56b974a3dbb05ea0d6fcbcc4e758ee133eb7

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/C/:AEwVs+0jNDY1qi/qa

Malware Config

Signatures

  • Detects MyDoom family 9 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b40d8bd937a9daa41cf8274f82a1013b575b5cc20e95e8999f9e30eb401da9bN.exe
    "C:\Users\Admin\AppData\Local\Temp\0b40d8bd937a9daa41cf8274f82a1013b575b5cc20e95e8999f9e30eb401da9bN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab1964.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1987.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp1C49.tmp

    Filesize

    29KB

    MD5

    a41d4877fe175548ad6e63b4e1734f9f

    SHA1

    988b0867c07df092a87edfb9b0c7f8b19c5ce07a

    SHA256

    2678f74e3f592bbc0a995789e77c5f5e66a3ca56516c76d2dae22d09bd2c3b7d

    SHA512

    aae7b4047fb2781646505313f714b531154bda8f6defb1898f75a5c9fca34b3591e3981f77d9aefef79b0f4a71e0b3b6255cf5df389333c93febdf04bbf007eb

  • C:\Users\Admin\AppData\Local\Temp\w4ihiaNhc.log

    Filesize

    256B

    MD5

    408c7262d3407b130a0eb8aac1eed742

    SHA1

    54e6ed449d9f1ebda1b794076a478faf83008750

    SHA256

    47e42a416d9341bb443c80f69b014dcfac4699762904c6875f5789bd79919111

    SHA512

    0548c3a882086dea59a6a4e765c5b2cdfd341f17d7e6db7cfcab41274a71e22f75e9ca4b7abf89eeef7990eb8c498d6630b48789bf79e22879fb70a1b11931a4

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    2ed730bb7058f8a637c82f872ac40c57

    SHA1

    d89392f12174e65077263532440e8cdc3b6eb558

    SHA256

    f7998c52d3fbd807bda0373d20eaf4352ba90e22fb424e2ef9b8bae253296e06

    SHA512

    8c356e59129315d38b0aa08c9e633e5484f3a4f273070baf5f1b9cf4a1b231d75e56307c8c77cfb12844599e14353dfc8124c817c052a057995f5975c7567679

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    fb3ec025bacf2ae4168d3aa4dd0a8120

    SHA1

    3287b0320c75c032727c8d77a079549a84d2dcbb

    SHA256

    44379fb29c6f9ca0492e5f31fc0d77a03510c519342c6fdfbfd8bfe1e78e52f0

    SHA512

    71c2426441601bd4a426e28d60633585ef56d48a2c794329082a4d7755c257adac12c26cce4098acf2e75405eeea1456b1c2f9914f178feb1be2aa2c5a7c1f2a

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2068-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-55-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2068-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2856-56-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2856-66-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-54-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-68-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-2-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-36-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-31-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2856-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB