Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 01:17

General

  • Target

    8dc33620ecb461a527ff363b520a06b100f7f57ae77c52312dd200bcc0ba9375N.exe

  • Size

    29KB

  • MD5

    37f98104b8802de537ec9413debe38c0

  • SHA1

    8b4954ae17ac05349c48d272e1ee828dbdf75715

  • SHA256

    8dc33620ecb461a527ff363b520a06b100f7f57ae77c52312dd200bcc0ba9375

  • SHA512

    e5add7a89f454dc1f68fc21d678b4fd4d9e2fbd3667177af64a3ce8546d5b33c7a4234ded2ea9415f41b05d232c22521d824fe51936fcf946063cd0a4cd6a04b

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/P:AEwVs+0jNDY1qi/qn

Malware Config

Signatures

  • Detects MyDoom family 5 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dc33620ecb461a527ff363b520a06b100f7f57ae77c52312dd200bcc0ba9375N.exe
    "C:\Users\Admin\AppData\Local\Temp\8dc33620ecb461a527ff363b520a06b100f7f57ae77c52312dd200bcc0ba9375N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0GUUC90F\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\tmpDED2.tmp

    Filesize

    29KB

    MD5

    2e771883b51fa8f26ce182225ff578c7

    SHA1

    eded70a33cfa1d7ea27f67d133f02b0fa2f9631d

    SHA256

    4abf2123e354ea0b236131fac9f453095326d58837e7c1bba65e809967da3609

    SHA512

    5f0edef70b4d57f42a964ee9c750f6a3404df1295d7edd6b8bbeb3a8968630cb69a02eafbc2fcffff78c33314bad75c32091084fe35e8ea1566445342034c8c9

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    af96ff20b7b45997c3ab83fc836e6510

    SHA1

    424c2548118c03a6d1e04d04732465f5dbc1662b

    SHA256

    8ba9b2359179b88a671733d43f316e6f3ea2ee0ce4b43b85b67d8ab176d9d192

    SHA512

    06294da0a2942bd62c8c2416138482f0cf8fb1394d5181f8c0998a5b63faf47fb2659127023b1df9f07294304be83affe86d32e61a9c9ee1614c62daa149dbb7

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    5268eda080a1e2518e4cf69a7805cca5

    SHA1

    42219ec19bfc210bc1f8e0859db5751658c47b2b

    SHA256

    0ccb3b0f9cb215156d78b10e9c078f1ac60ec54fcbec8923baa2750e2fce7c78

    SHA512

    947b7c83a52c0d047609c36baab80709e7c14eee3c329ee82d9b869be5d9cb22bb1a3ccee91becf890da96b652ba1fb29a67f75bcf8c4b63c42398d4080a005d

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    ef391a65f05514f371b87fbbc61873c6

    SHA1

    0b14c3b663e4cb9e3f0af6ccaf17d43daf9425e6

    SHA256

    1bf499cca76ad943b91c20925ecd574e2607d517b5c65707b06f06f814c2596c

    SHA512

    830037f749e89451a17cdeffaa4653f1e2fa05b4ae477a860c6b810c74069eaced1d954ade46e88ab1a038d185c471e4abe5d2ab22d8f4d07a96366fdd8cc810

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1804-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1804-154-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1804-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1804-150-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1804-114-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1804-44-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4412-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-115-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-151-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4412-155-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB