Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 21:02

General

  • Target

    eca5b80adeeb0503da7013b1024d36293fc56bb9af6f22fce8c5a314640688f8N.exe

  • Size

    29KB

  • MD5

    27de9b300d9e2807ab91989a97b251e0

  • SHA1

    2f9949f7049bf03d14dd0de5df947d6212e811db

  • SHA256

    eca5b80adeeb0503da7013b1024d36293fc56bb9af6f22fce8c5a314640688f8

  • SHA512

    763565830e00c461154c83a76a0594d9a3a2875acf482b812e28426e0abb419628f922cfd75355e7354b94c72bcd6cb424cac0dbac0f0549ffff3bc34f47e3fe

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/i:AEwVs+0jNDY1qi/qa

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca5b80adeeb0503da7013b1024d36293fc56bb9af6f22fce8c5a314640688f8N.exe
    "C:\Users\Admin\AppData\Local\Temp\eca5b80adeeb0503da7013b1024d36293fc56bb9af6f22fce8c5a314640688f8N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpBA2B.tmp

    Filesize

    29KB

    MD5

    bfb4bd14bf32e806db875f344a4b1b6e

    SHA1

    1e2a025ea18ab7544a87590c07119e0c883c0bc8

    SHA256

    980ab1d063de7ff91810f15b94cd6ad769be6c890131a0a450c2f5626c8e29a1

    SHA512

    58861ed07955616777fc51e3e81636f1ed878509f7cd64d83a8a35451ac04f607437e3463338f86c4aed86e1eae982cb4bb365e5c9fd156a648ba75848f9acce

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    e7a20a2e3bca27e7f6c77d824a67d4cf

    SHA1

    e4deea3ea552e46e55670cfb60038420e977bbb6

    SHA256

    d143eeabe6d500e05a1d9a1248e11edbaa73f604eed8d461040ad71491514470

    SHA512

    257183fab298ca5ba0ad15c00adafa885377de00c085ea7f28ca56ff18dbc22ac8ec43c3eeefdb75bdbb10b8f1f8a85a1c85839a56e1e8e9bb9cb59cff6f4c3c

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    3237e5b5b85d762d1f3667bd56e3c9d5

    SHA1

    ae14e88f88bb5d99eb1470de5b258549ca7f979e

    SHA256

    f3fe51ed63708ccc310d4479baf9c80bd30b784b470c225db5bd35b20cad6ffe

    SHA512

    b3b04f2b62d87d9b11499ab2ab45121cca4501609a9acf6c019526dc7a8ab03c036fdba8ff0737718d6f0e553c4edea2afd23020baa345448928b250f7985295

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2240-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2240-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2240-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2240-67-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-60-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-55-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-53-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-33-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-2-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2240-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-34-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-39-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-54-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-27-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-56-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-61-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2696-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB