Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 10:17

General

  • Target

    a72f529b97742a14464081c1990d3f7ab2079163241f491d33e89a99ecfef56bN.exe

  • Size

    29KB

  • MD5

    f25d43b178ecffd38158c0d3ee6362e0

  • SHA1

    fbd6af56369ba7ee336b2452a1a6e9299b327826

  • SHA256

    a72f529b97742a14464081c1990d3f7ab2079163241f491d33e89a99ecfef56b

  • SHA512

    c47966340b918008bacfb7c8f399839b147312f13ab15de278d51023306be1ae5b1d91c2f3bd404e1c977ecf0425a345fcec74d2643d656f81b4ccc08b68c9ef

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/2hp:AEwVs+0jNDY1qi/qOT

Malware Config

Signatures

  • Detects MyDoom family 5 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a72f529b97742a14464081c1990d3f7ab2079163241f491d33e89a99ecfef56bN.exe
    "C:\Users\Admin\AppData\Local\Temp\a72f529b97742a14464081c1990d3f7ab2079163241f491d33e89a99ecfef56bN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpB87.tmp

    Filesize

    29KB

    MD5

    8ac7f4c6fb28268616e766a11a99bd31

    SHA1

    12bbe9ef358f37b3cd91980d05dabbb3e2319964

    SHA256

    27e0cd97f65954a858669b4f025e7e8ddf9996a295ba7270fe2482c5fdb9e330

    SHA512

    505d8158a01a213d77c02e89f7d57bb53d15da03e143beb859da768b926dd72c922dc7f417b81657b4d3dad2ac30a9be63eca045981ad732de3b408ecb37c41f

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    5a97286b28d748eeece5568644aec0f0

    SHA1

    1ffc2c23cd82c7533b9df67471513e73bf461f88

    SHA256

    6479623b85bdab6b2b62d4b6d538012f07a413794784a747ca1e201d4be3df2d

    SHA512

    f30adc8deab8c1f35b1005a690f01ede1883aa93bd7f2a21ee391e1ff5ce323d2c01dec93579184eea615760736b407bffb402fc81e17a5140a2d1fff455cd67

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/328-17-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/328-43-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/328-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/328-76-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/328-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/328-69-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/328-4-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/328-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2524-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-49-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2524-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB