Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2024, 03:14

General

  • Target

    b7790e020f49dfe7400f6cef1913e7c182b647e5bae5d60b356e64720e6ccd6a.exe

  • Size

    29KB

  • MD5

    bd3796bf7522ff9b6bb6be7d26ddc6d0

  • SHA1

    01b147f4fcd67764a893f0d79320e968b220e6d0

  • SHA256

    b7790e020f49dfe7400f6cef1913e7c182b647e5bae5d60b356e64720e6ccd6a

  • SHA512

    452c97cf6d14ead0bb849d01e26824f6feb833695237ce8648226ed03e7b9788fb4dba9993cdc537d7956650ca9bebdee94fc92797359a3169f260420346c106

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/T1:AEwVs+0jNDY1qi/qJ

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7790e020f49dfe7400f6cef1913e7c182b647e5bae5d60b356e64720e6ccd6a.exe
    "C:\Users\Admin\AppData\Local\Temp\b7790e020f49dfe7400f6cef1913e7c182b647e5bae5d60b356e64720e6ccd6a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88651ffed4d1cd6b728f53e6df38fb39

    SHA1

    29d6e0af9bac29afb3cc640eb24ea9bc3b3c3bf1

    SHA256

    dca616fe9d7a0ac3491f973271c3e557e88c5870a057ef84801df725fa09732d

    SHA512

    b3723ee96c2666580566d419f93613c5e9fcfa2c583245a0d8409984b3860b5c36ab9a6ed436fc41bbec7eae0bb379e108c4cf599eeb49b787b764a7a6ad36bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad747e0883b82aa6c90ad00b4e6d3bc0

    SHA1

    9b84c964ba4a8f4e1d7a1cd68aa3cb8510fdafb3

    SHA256

    f7b19bde3fc9793ea2e1365173fb94ba9f75e01f2341203d572beb2c0acf0bc9

    SHA512

    dec46888daec047e2a0fcb12df04de338e7a33a931f8fea825bbd4a4821c9c0d95db7107b6369b5957b8121c202d6a3f01af3d28d6b5839fcd4bbb95a1137d1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    467466d43e2cdede6f3cbc26572b12dc

    SHA1

    d967492efe95ffb78c623328a089d00df6c851a0

    SHA256

    0e443835fe91c13a18fcca6cb97e48eb557bbefb3de6ba1e05e99db32be3d3e7

    SHA512

    c9bf99bbff354501324aecb6faf5f8079df3dd53432b7adafad22a1afe5a06f649fe276c1fd762612328a4472fd93185b8ecdd544efd786180222cd3b8fd59c9

  • C:\Users\Admin\AppData\Local\Temp\Cab7883.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7932.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp649D.tmp

    Filesize

    29KB

    MD5

    a22293f84af2b4a51bda2b8bd236684f

    SHA1

    b3b3b57f6c4ef1210f8973565d6a60ccc7107ad3

    SHA256

    ef4792ad5f1d6be7a1e0b6524bba68de863d0d5ca8917cbdf4232c597cd04733

    SHA512

    34dd084372c5870964936a3bc3f36a73eab00478baa2e13166501380a38dbacf696d0358510eb237e4e07ced1a4971409ea4e22e777ee19b3da4064e3166bb83

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    4e77cea890aff82b90a8dfed5bb842eb

    SHA1

    5cd671fc654176bb1844fb84e526e6b946563139

    SHA256

    735f69df6aa6a80ea4aa3b85ee392720ede2a0887a4d5f7aec5d2f5ee201d11d

    SHA512

    f1e542a375bdd91e8f70bc95766a530f127a85fcfff9450a828bd12b0ff4e3c0a59f1a9f4940de8f7d16b5bf34c81eb4a262019d602289a251205e352c135de1

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    b4e1a3e98e3ab7a61697af3c7e2b2199

    SHA1

    dc3dc3b6d28ded31f73fd81a997a7c2c8bc89303

    SHA256

    f64b4b1f2a17294b87dea84385d089640bf4afe2027463007e8892fb674fffd1

    SHA512

    304794c37989b89354679df3020a8bc01fc338ab22fd01078966af39050a3aa087e1eebd1c7e662e58faedb434c248fc9904f78f6b823812a8184951452e2499

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2448-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-101-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-40-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-74-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-65-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-3-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2448-60-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2448-67-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2768-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-61-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-80-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-102-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2768-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB