Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 02:35

General

  • Target

    c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe

  • Size

    29KB

  • MD5

    0bc198bfe9e5f961d6b804f12bb7ec1d

  • SHA1

    d40fd969258c3a9c5603fadde5cab23e59281bfe

  • SHA256

    c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec

  • SHA512

    6b570382318dabfa180ae277d1892bcfbb8cac27bd50fbd412bdf819b32df51b85f5237c95477496aeeac143057da0add0842e8119d9c4fe4d0191378d12f9e9

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Ah9:AEwVs+0jNDY1qi/q4n

Malware Config

Signatures

  • Detects MyDoom family 6 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe
    "C:\Users\Admin\AppData\Local\Temp\c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4EBE.tmp

    Filesize

    29KB

    MD5

    20623326b457a1d45c0342f8833dd89d

    SHA1

    49862210b949a9d69ba478a0c71580cf7ee6dca5

    SHA256

    165e09e82d428b5cbd098d0e754e168d3b4dcace98771fd18e357c2cefe7cd66

    SHA512

    fa23c8c114b5ad2a00d014d9b4d4dc9d08d985df4772e82402a325b590ed186f994726a9ab94e27653cc8d46f44183087f2e4994287f5c5c76d2963c26b062f4

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    15aea26c6c35cd2b1e71acb1f2fc5e5f

    SHA1

    19435870cc23c915aafda6a2dd2f8a95e900b985

    SHA256

    5c8c5eb7a97efebad5b37a9eb1ba6262affbd8913c550a223bc3f8e046d3ba58

    SHA512

    6c96c56f4d8ce4d5be0ac05abb2d390755e36c6ded6e157b61367dd3d846359ddcef7eba0ad24bc1b0a725b7b687305e36140dd8e423df6b70c82754c61f3942

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1716-87-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-16-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1716-47-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-80-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-15-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1716-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-53-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-88-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2956-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB