Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2024, 02:46

General

  • Target

    1a903f28e70b7a300b177a94043aba6350f2c2afd52df2d80138235c441554e3N.exe

  • Size

    29KB

  • MD5

    eafbd18177fe96dcee54d0986797df90

  • SHA1

    b397a94cd76aa5a006f8a92e2066eb7b4f22c7c1

  • SHA256

    1a903f28e70b7a300b177a94043aba6350f2c2afd52df2d80138235c441554e3

  • SHA512

    44833e60fecef5376fee9ebb35dd48c46cf892458286381b1c1f727cea5e25e7c9cdf24213eaca2e2a23152abb0b588151d3656125d4a0f2d64e0efc5a18373c

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/P8:AEwVs+0jNDY1qi/qs

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a903f28e70b7a300b177a94043aba6350f2c2afd52df2d80138235c441554e3N.exe
    "C:\Users\Admin\AppData\Local\Temp\1a903f28e70b7a300b177a94043aba6350f2c2afd52df2d80138235c441554e3N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bcepeU.log

    Filesize

    320B

    MD5

    758a7f70f96c141b4cafb924b77bb344

    SHA1

    afc828bf679170ee237b60b1ba71d4aa7acc83af

    SHA256

    b5a0caa10ae66df159b1955375491c98342a2420b6ed9765a9783ab65dda970a

    SHA512

    fe147e0f461b7685ca59c2f8e44d11be9c4b46c9cf5985bd5cea5b7009e7629d2203bfd8a89688526491ce4393c0e461f9e82962690c11f14bc35465f685b57b

  • C:\Users\Admin\AppData\Local\Temp\tmpB7BB.tmp

    Filesize

    29KB

    MD5

    6189d49eece246c2a92b9a6d23830461

    SHA1

    416dae90cc7d3f08471d57bf61bffa44837cf4e7

    SHA256

    d0e4b6b08ed40ada3cec901800534371c111e13aba060176febac5cfa820ac60

    SHA512

    d7e20fcb77f2aad781c9d95cb57c2379e3acdbfcd95d264efedeec1247869e3b7f9fb7105a2a3d604a2a8d76fcf0d0bfc7c6266bfed2f9eb543a2c964a612d68

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    ecb031283406f110de09062603792619

    SHA1

    85872dd0d25cb1873dacb26e3ceae5ceecbbee17

    SHA256

    d31ba5782bf999d70a4a660906ff4557100e0b1a1ecfb93b88ffbfb71805e91d

    SHA512

    02722c60e6fd89fbdae788acfb34627706388f9b9f1bdaeb42b25d60833463af8e8e699543e827ba3d8fbc0ad457ab2b5e2946433bf2c35315b849105ddc3cf6

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    24161e8163eaaf10e26d27bb9941b22f

    SHA1

    d03a34afa254f477cee7abe3b5e24548832e5cb4

    SHA256

    1988863d49e348d69ae6a1b0330924ab0cdd79880ceac33babdfbec3be8b8acd

    SHA512

    5b79919aab6c843cdaa931afec25ad2a1280ea123ad444c50d58d54205d4d074c7bb415daa64383cd82aad123791588a245031b5d89ef7d2d605622ecc86850f

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2584-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-65-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2584-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3016-57-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-59-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-2-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-64-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-9-0x0000000000260000-0x0000000000268000-memory.dmp

    Filesize

    32KB

  • memory/3016-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-36-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-31-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/3016-4-0x0000000000260000-0x0000000000268000-memory.dmp

    Filesize

    32KB