Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 00:17

General

  • Target

    8d9e4ae1a5a1b0f62d7b7ed4af5ecf8613cd27ea2997a75e2eb3396fd1fc8f29.exe

  • Size

    29KB

  • MD5

    573aabbbea015834206fd62645fd95a4

  • SHA1

    d63e9b042807911c509a1b4bee0a8cf1bd752478

  • SHA256

    8d9e4ae1a5a1b0f62d7b7ed4af5ecf8613cd27ea2997a75e2eb3396fd1fc8f29

  • SHA512

    e8b1a7377e89d2b89808da39a86db5abb3ff8378193df0534206b5e35202314277c4762c33528a28a99af86ae51665e26b39ec8e80f57f60372b46be12dea1e7

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Q:AEwVs+0jNDY1qi/qI

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9e4ae1a5a1b0f62d7b7ed4af5ecf8613cd27ea2997a75e2eb3396fd1fc8f29.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9e4ae1a5a1b0f62d7b7ed4af5ecf8613cd27ea2997a75e2eb3396fd1fc8f29.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e2f547350383b4864218c4be57ccf2b

    SHA1

    d88eadb091554bac7590c6afabc9529d905e3669

    SHA256

    2f758a7e57cd65b26bd1986ae12808cca07d9dfb41615a7bf9645b5fb68b6922

    SHA512

    8d68e28ad904f56a1f38984e96b5c3576dfce3bc0cc10997b92f3549a5740074e728b7928730176d3e522feffe564243c38deb8ffcfb1f1ab7b0af0a5367c6dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65c016d5764a575da7912e6937a413c

    SHA1

    1dd8227e95ee78bc6ac77a1f48bdb650ed7da391

    SHA256

    5686caa31c605b68eaab4028f4f44766bd5af93758152316f002a70da1a4bb08

    SHA512

    779885342c514e47f4c92bf6857239672f4016a634c9beb48c5632beae689494e98cb58a4534ec623099417544e5fdbb7fb577abdbfe80c0007135e8c8f49dce

  • C:\Users\Admin\AppData\Local\Temp\Cab133D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar13EB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpAEB.tmp

    Filesize

    29KB

    MD5

    c45374ff1734e630d531b23ff56b8c9a

    SHA1

    28510601c7bcc3f48be6c1b20034085371b2a257

    SHA256

    6a53e4f3b4a2c577b49cf044d386095555588ae5952d47c1bd56ee1d195515ea

    SHA512

    cca3ae076b2ce2857a35cf0502b8f0d95309410ef8386a70bb6f8d04f11fd078a0a82146848ad64f6c22120480689b26edd0adde4ae951ed6c7bcd1015bfe117

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    83181d1fc2ce0c50a0a77a56accf9f20

    SHA1

    aacc91fcd6ec36ea80316034612bde475c4b2c7a

    SHA256

    7ba18b6f6fad132e93ecf941f7fe7249e1cc736e26649ad5e8c7d8432ea08405

    SHA512

    4eedfe83a1ce82534692d7c093aaea4b807be7b3169a48c82e6536a802d84b4c34da09855536b1c3d0fd752317e8616bbe3043250773e193dbba3b554a438e11

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    16654e2aafb4c24d4dce0a79f04a1770

    SHA1

    a4cc1a26762c78340b8f6697198031895a9c5ee2

    SHA256

    0fea2c66ecf81072c15434bd5e86a89ca627fa5948bfd0e04d0fd019ad92741e

    SHA512

    244a798dbd65282f3d1efc4f98db17109c5527f3906405d608b44f41409dcdcb64c56b69e85446dca1e8a6fed1ed5579ba484a064597f1b296981207906bbc34

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1668-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1668-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-73-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-85-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-83-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-47-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-78-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-15-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1668-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1668-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2316-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-84-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-86-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-91-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB