Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 19:38

General

  • Target

    0bc06c30073e1d32ecdf879db723d9a5e83040cf0bc26ddaf664e5d6abea43bf.exe

  • Size

    50KB

  • MD5

    273860c59ba303ecab17a74b5456380e

  • SHA1

    65470c6b7532768a2e4e0502a23aec6245130107

  • SHA256

    0bc06c30073e1d32ecdf879db723d9a5e83040cf0bc26ddaf664e5d6abea43bf

  • SHA512

    fa2660940470c5032825742b22b4b5214c5fecca7b23acacb3bccc6e27e9019371092a4d13ffec311fb44c2047118d3596cb446a0694d3a30c16985404168027

  • SSDEEP

    768:/EU07c92/EyTAYtxqfGNC0klI7C8yOvi3e4xqbZolf4HWnxZnksrHREUHQTC:/g7wc1aGNC0klI7CPN3LEVo6HWnldHQ2

Malware Config

Signatures

  • Detects MyDoom family 3 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bc06c30073e1d32ecdf879db723d9a5e83040cf0bc26ddaf664e5d6abea43bf.exe
    "C:\Users\Admin\AppData\Local\Temp\0bc06c30073e1d32ecdf879db723d9a5e83040cf0bc26ddaf664e5d6abea43bf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\index.com

    Filesize

    50KB

    MD5

    273860c59ba303ecab17a74b5456380e

    SHA1

    65470c6b7532768a2e4e0502a23aec6245130107

    SHA256

    0bc06c30073e1d32ecdf879db723d9a5e83040cf0bc26ddaf664e5d6abea43bf

    SHA512

    fa2660940470c5032825742b22b4b5214c5fecca7b23acacb3bccc6e27e9019371092a4d13ffec311fb44c2047118d3596cb446a0694d3a30c16985404168027

  • memory/2244-0-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB

  • memory/2244-3-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB