Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2024, 10:08

General

  • Target

    8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe

  • Size

    29KB

  • MD5

    1208bcf786445fb6ec625297034743f0

  • SHA1

    322e137a2c9f8090387c83b2e1e15afb4f74bacf

  • SHA256

    8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681f

  • SHA512

    512ed0d7839ccb9fd48a82daf065b4dc29ad07286251e630a15baaa302ab567b51213ea4656b37ed278595309cb4689daccf6d26675a486d8528919b7fa89da1

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/ZuI:AEwVs+0jNDY1qi/q7

Malware Config

Signatures

  • Detects MyDoom family 5 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe
    "C:\Users\Admin\AppData\Local\Temp\8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp1AC3.tmp

    Filesize

    29KB

    MD5

    68887660d6d767ae2fb70604ee1c63bb

    SHA1

    5865dd909a5ec7dc7c3221f3b228af7055dd9b01

    SHA256

    b64f548a2ef8cb7e1cab980dded547a258d216b57b681785dbdcbbf581b2a632

    SHA512

    729c24278ed20298beac9573861536dc1efba0d5f5a5c713b46b378c3db56881911a9f1b83380985f9c7f3cda0e5239062f881f8bb95bd2ac5f7d0f8ddaa02bc

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    8f8b5c13c8827c35ec277702c69f1b55

    SHA1

    964044abfa4283efaa26fe55989bde24d8fdcb51

    SHA256

    6599d46f174d51871db1b0dc136f05d4969771812ba2f3f65a269051eee592cd

    SHA512

    3e79918378a42144b11d277a4fdf93f6a235c2ae77d24ad3ec7e9a1eb7f618a704828e43bae390d4d98be5a223270bd7d3d08a6bb65308e52ba789f278e0a6d8

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2224-65-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-41-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-69-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2224-9-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2224-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2744-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2744-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB