Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 14:48

General

  • Target

    84a0be4c99c77d55884df636fb1521e1b968beed4c36501d0271acd55bd71654N.exe

  • Size

    29KB

  • MD5

    ae39d7f72d13fd01ace2910eb2576dd0

  • SHA1

    8bc1ad69868586ec744d185a86e8f61c2e9302fc

  • SHA256

    84a0be4c99c77d55884df636fb1521e1b968beed4c36501d0271acd55bd71654

  • SHA512

    9e2a02528dbac23bab5dcff658a91843cb00cdad0d0ff6216c038e900627c00fce932a7863188c5e949240e7aa9bdce27cbec033955b85179fe2749c688e6a95

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/D:AEwVs+0jNDY1qi/qb

Malware Config

Signatures

  • Detects MyDoom family 6 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84a0be4c99c77d55884df636fb1521e1b968beed4c36501d0271acd55bd71654N.exe
    "C:\Users\Admin\AppData\Local\Temp\84a0be4c99c77d55884df636fb1521e1b968beed4c36501d0271acd55bd71654N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n5sBnguk.log

    Filesize

    320B

    MD5

    7614771190b91dff0558dcfea72673a3

    SHA1

    a1617c6fa37419cfa3d40a482e01583c5ab6d816

    SHA256

    785f57748bcd9bb5b34dc95205edc26fe7aa8ffda53b4dced1fbd9642a897e5d

    SHA512

    7765d516cd03ecb00a7e3f8a92a52be7f478a01c28addb6fea7bdf9949b954c4faa2d88008bad7b5081139c5d46ee3a44081661479a600095d71b9dd67db53a5

  • C:\Users\Admin\AppData\Local\Temp\tmpCB7B.tmp

    Filesize

    29KB

    MD5

    5b8aff870c984d5d7b126da3aded727d

    SHA1

    278c17aaa8413ff42a8d7997ec3ac63a061aa063

    SHA256

    62f05976bf0891c7299683a55647435dc8c04b0e13f42384a50cf8ce7a1789b2

    SHA512

    37f6b10d59aa63650186727327c14572cdae5c557c43b12279eba69c888da3ed3136b2705f7711e2a80e57ff37c01618d656b4c7c74b5ac9ff35bbc1a76d51b0

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    0403fcfd1af9cd127d2880552e088dab

    SHA1

    33788bd2767a6d558e694b3ce893d1badc361379

    SHA256

    cf021a63e950c8a16c0d7e70061f5626482b3ad17fce5c0709a7e6ee94204875

    SHA512

    1c534fca8a577dfe3e41b80956edf497b4f1da77c08ef2e5ed6d9e3d6f5a66e19e52c4def285ef3e87281235355b89695226d59c3a4b98e59c6a9dc5ab8d24ff

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1728-36-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-73-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-66-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1728-17-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1728-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1728-57-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3032-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3032-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB