Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2024, 07:09

General

  • Target

    611297ae239ae1e0365aa99737aa6d8e49e79382e8dfe7d559d02f8f55c9c818N.exe

  • Size

    29KB

  • MD5

    4ee3ec046ea2cf6378091cf657bbb180

  • SHA1

    e3d52c73d67272768c77f0059c9d2fd813de8235

  • SHA256

    611297ae239ae1e0365aa99737aa6d8e49e79382e8dfe7d559d02f8f55c9c818

  • SHA512

    28ceea6602ef53bc495d61d9794c20f6bcb4c95ca68de168aab54d1e435d63cd0c56c36ab610828e1d3c187a4fda60381ed25ddff958e85ad9241bedb928f782

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/t:AEwVs+0jNDY1qi/qV

Malware Config

Signatures

  • Detects MyDoom family 2 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\611297ae239ae1e0365aa99737aa6d8e49e79382e8dfe7d559d02f8f55c9c818N.exe
    "C:\Users\Admin\AppData\Local\Temp\611297ae239ae1e0365aa99737aa6d8e49e79382e8dfe7d559d02f8f55c9c818N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Crxeuokzi.log

    Filesize

    320B

    MD5

    b350d7d45d749c261cbe4a04a622b21c

    SHA1

    86a262a9b6689bca0b5ab9f449311195567534d8

    SHA256

    40cd6d1c160f535eac8375b160d95a5947134070328c987970038ab9b179140a

    SHA512

    1b03c5b4327d1edde3dee5c5e190ddff40ece3513ec437225109c0ce3e8043f3439509da44642669163679f78900bc6084352ac3d8ecc5c7626d013a306bb065

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    d70a7f078bdea1fe81f2f7c9882248e2

    SHA1

    d9b05898784b56ff4bca227a86c53c3c127a7abe

    SHA256

    88f0578b0bc2a80921fe9b91d457ecae682dc5c9ca181ea881692e9c6836c6f8

    SHA512

    7e3e40ba90fc6dad96864c440ac64dc5f94faeafc1896d219a8141a008d8989173dda335e78c4d6e7001611b5ba2bc0cd372530cf7dd3fce52e6cf2e1913af68

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/3560-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-57-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-52-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-45-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3560-50-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4932-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4932-56-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4932-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB