Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 22:56

General

  • Target

    f731c178511728724ccc7a5d9c98902f74d036cf71cdc4a8bbff054d0daf087eN.exe

  • Size

    41KB

  • MD5

    10b92c1e302d87bccb883e9a090ab350

  • SHA1

    ab982c4a375de94d5fc80fcb5e00049814e4cfb8

  • SHA256

    f731c178511728724ccc7a5d9c98902f74d036cf71cdc4a8bbff054d0daf087e

  • SHA512

    d97ed416dceb9d43751868ff4717023b32116036d70a88c5fbecbdf9067f2281d8c9a9f08984504fbc5ac595737cefe56dbd4b426be89f43cc7d916a637adbd2

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/T:AEwVs+0jNDY1qi/qL

Malware Config

Signatures

  • Detects MyDoom family 7 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f731c178511728724ccc7a5d9c98902f74d036cf71cdc4a8bbff054d0daf087eN.exe
    "C:\Users\Admin\AppData\Local\Temp\f731c178511728724ccc7a5d9c98902f74d036cf71cdc4a8bbff054d0daf087eN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp1F74.tmp

    Filesize

    41KB

    MD5

    2f3400307e84ff841f70a1dc578b0cbc

    SHA1

    d8ff552553a6d1478f443ec8e4f40c4cb57ad8c0

    SHA256

    4eb6f69b4a590856e62ca4f98a66fd7e7df3fd333baf56d429de034c77842a35

    SHA512

    d6f74ccfbfaf147ce35d5def06b8ca5b73c1d867106537383d5f78e25933f5f15c3896dff53f4c2909c38dcfdafe460ec4e4f64eb98b309c46c7180024a1103e

  • C:\Users\Admin\AppData\Local\Temp\yrwaaf.log

    Filesize

    128B

    MD5

    44a3d87279e490af9b10319ae0d19f25

    SHA1

    ac68939696d9c18715949eba7944301d48ec4960

    SHA256

    e9f975193061172ae11d832f041a165c7884546f6c969dc2b41bc7c2bba00aec

    SHA512

    e055b0e5bf066adf601ecb7d5554488906bce002953c4704ace21412f9404d0a382d75f57636389c91bdeaf54b704cbcc90fbd895e02cf729919931f29f8b401

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    160B

    MD5

    e6d50a735f5f884a59abb0ffa7774199

    SHA1

    b6d22d9e12722c80596922eabb58ea03198e53c1

    SHA256

    d293f7ef403b80d329e7945eed25999a9f1f69d2adf71b62aac9cf537b711c1f

    SHA512

    a04ec8cef597967f3d0b47eb730f7007e7870720c88b601142a4b5cca1f4b3cc2d3b288ddad57ca1448de2cff76699135773a6fb62d817a0338adcb71fff5393

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1308-40-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-78-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-73-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-66-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1308-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1308-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2880-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2880-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB