Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 23:50

General

  • Target

    c093807ea0b3404812787cedea3fe36411c3038aea81831ce7ec84000a463fc7.exe

  • Size

    29KB

  • MD5

    2a2cae6cd4694a69e12156c7ea5cdef5

  • SHA1

    9e8f936accd69bddc237172575430f1a3eda0190

  • SHA256

    c093807ea0b3404812787cedea3fe36411c3038aea81831ce7ec84000a463fc7

  • SHA512

    bded2ce40e0e0e553c29a1d9f7d2439876f91713ae282f57c8b6d8d67eeb2319a084de9a13bacfcae722d6663a90625bb8e8619c4e65d023490a55ac22ff9aa5

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Pz:AEwVs+0jNDY1qi/qj

Malware Config

Signatures

  • Detects MyDoom family 9 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c093807ea0b3404812787cedea3fe36411c3038aea81831ce7ec84000a463fc7.exe
    "C:\Users\Admin\AppData\Local\Temp\c093807ea0b3404812787cedea3fe36411c3038aea81831ce7ec84000a463fc7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab61F8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar621A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\sjN4knybix.log

    Filesize

    320B

    MD5

    9524d4aa61391f4af829068f89bbe539

    SHA1

    eb058987d85a2c705cc2252ef8db3e9dc5b3841c

    SHA256

    d4b8e9313b6c4efd9520f98fed6b3f5505c074f5eda7cc5739e4b8f98d7962c1

    SHA512

    532427d5653b974f7d7e23b8f31e9383316bb4207e1af82dd2a2e490a866f38e87a70980e1b99036717973dfb65039826406b05e24098112491b942a2441ffb9

  • C:\Users\Admin\AppData\Local\Temp\tmp568B.tmp

    Filesize

    29KB

    MD5

    03d67ba3abc5d3892b58f1ed730081ae

    SHA1

    48abcf81cd579a68c02c042986906a439e1d8746

    SHA256

    aff6a0fb3beb1574a083bb851ebc30907921ef190e1f6e3c857680fb9061161c

    SHA512

    10badeab1b3da87a99bfca7f9a98a33f13fccb23ab65f818750d2e3adabe547bad1ab90bb945f33303121a99e433024e2cfc2098f11d644172b759f014b10a8d

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    2634ce9b5a8975cd508573834219c8b9

    SHA1

    29925bc6c3caef41ec1adb59a109b81b667a74ac

    SHA256

    0e2411d15baa1bea23424055a4ffb1ccd0f3e93813a095a34873dc21d3b7a8b4

    SHA512

    82bfbc06befeacfec3b39863b009b7294fc41524367b8bca2cb643a5c355f6f32db0448fe149d8578aefe11e7881dcc376628647781fda160d564f78b3dafd68

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    ff46b4a74c594dae771a7277518e8cbe

    SHA1

    0f34f4efb3836e6c6c2317510e26fb709f295086

    SHA256

    2863bc296357082856a997182866e98c17922f545051a846b61ab68955b89ac7

    SHA512

    9a685192e7df84eea87224bcc70c5557979c6938df46c60e5f2d486aaa64f4737fa04612b29a145838b61aa1b4c88530ca022223b8eabb983a5bfaadb5c31ad1

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2372-82-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-169-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-40-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-16-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/2372-15-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-68-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-59-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-80-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-4-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/2372-63-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2372-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2816-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-64-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-170-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2816-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB