Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 23:05

General

  • Target

    61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe

  • Size

    29KB

  • MD5

    3a9851cc666ee331258cc1e208a92929

  • SHA1

    0fb4405948e786918ac74cd70f8ca9335a9205b1

  • SHA256

    61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3

  • SHA512

    5fc9d3a681a68788332c7d41cc30b83937ac1b6eb60be4271437c3f7a746e25991f684d66be5dcee5dbc1c1235560fd4fc60512be8b61a020e2fc9637ebb4fab

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Xh1:AEwVs+0jNDY1qi/qvP

Malware Config

Signatures

  • Detects MyDoom family 4 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe
    "C:\Users\Admin\AppData\Local\Temp\61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPUS7TYC\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\tmp7FE4.tmp

    Filesize

    29KB

    MD5

    7091fcf660643aab0a6fce7e60d7c1ee

    SHA1

    f86f9a9cddf18a667d38173f56ef6bf261f71077

    SHA256

    47a4b01671fcbcd8a65a6a3f7c54290f943548dd0e67346ebace751cb45e1379

    SHA512

    d56ba22ff4eb4ad56111fadf067a0bc0b922e913b39b48b53afd132006ceca4bb2a772013c04e309b1a4c1b554e730d21d166b83477169d0cb4cf1ea82bac4ce

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    d54764c244edff1a285dc02768983696

    SHA1

    8ac327750c20c3879d1c625ab177c7890d0d5c6d

    SHA256

    cf8bb72c02db4351b2fedbd26f036a9c545e2cfdcf95b95ae49532c9c1524b01

    SHA512

    ad4262fda3c27dfa4996d6b109ca2e2703fadd3eed0c74491a9ee36c52c482e898620b4424620efdd7fd072afcc7013bdee98412f34d64923330768a13a5a707

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    92a028f551b3f6a97e06c0e3d7a78a38

    SHA1

    ead0e8a2904cbd0a82eb9225fb8fc0f8abb24fe2

    SHA256

    0e92e915967217f10326cc15b02c5bdf9d05b1fee7dc66ef62ec621ab3a4261a

    SHA512

    57150d57e1755d44c77cd63860225a93a20adf35bd576144ef57988cbae6c1bd2c27c1a4df095d5abcfca5640c8279bfc0f574cc40946f0161dfc3c3b25c7a21

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/4784-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-52-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-174-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-170-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-6-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4784-134-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4824-131-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4824-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4824-169-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4824-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4824-56-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB