download:

/vir/Email-Worm.Win32.Mydoom.u

Full analysis: https://app.any.run/tasks/a55948ea-33ac-44f0-b33a-c7a073d35f08
Verdict: Malicious activity
Analysis date: December 09, 2024, 23:03:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
upx
api-base64
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

F169C212B9EB77979DF00BDDE116B400

SHA1:

ACF6DE3E87851F70FD76007246389874C66ADBE8

SHA256:

B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975

SSDEEP:

384:kHrFWTS5x0J8NQnfdVpQ1lw2oWlFElv0xQG2823xEi0lNayKsirEG1Xyl:wFWT7J5nLSXdoWlFxk3NNEG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 1932)
    • Executable content was dropped or overwritten

      • Email-Worm.Win32.Mydoom.u.exe (PID: 3272)
      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • Reads security settings of Internet Explorer

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • Reads the Internet Settings

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
      • control.exe (PID: 1744)
    • Starts CMD.EXE for commands execution

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • Executing commands from a ".bat" file

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • Uses RUNDLL32.EXE to load library

      • control.exe (PID: 1744)
    • Connects to SMTP port

      • Email-Worm.Win32.Mydoom.u.exe (PID: 3272)
  • INFO

    • Checks supported languages

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • UPX packer has been detected

      • Email-Worm.Win32.Mydoom.u.exe (PID: 3272)
    • Potential dynamic function import (Base64 Encoded 'GetProcAddress')

      • Email-Worm.Win32.Mydoom.u.exe (PID: 3272)
    • Potential library load (Base64 Encoded 'LoadLibrary')

      • Email-Worm.Win32.Mydoom.u.exe (PID: 3272)
    • Reads the computer name

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
    • The process uses the downloaded file

      • Email-Worm.Win32.Mydoom.u.exe (PID: 2260)
      • control.exe (PID: 1744)
    • Manual execution by a user

      • control.exe (PID: 1744)
    • Reads security settings of Internet Explorer

      • control.exe (PID: 1744)
    • Reads the time zone

      • rundll32.exe (PID: 828)
    • Checks transactions between databases Windows and Oracle

      • rundll32.exe (PID: 828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.8)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (19)
.exe | DOS Executable Generic (18.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 20480
InitializedDataSize: 4096
UninitializedDataSize: 28672
EntryPoint: 0xc090
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
7
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start runas.exe no specs email-worm.win32.mydoom.u.exe cmd.exe no specs control.exe no specs rundll32.exe no specs timedate.cpl no specs email-worm.win32.mydoom.u.exe

Process information

PID
CMD
Path
Indicators
Parent process
828"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl",C:\Windows\System32\rundll32.execontrol.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tzres.dll
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1744"C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl",C:\Windows\System32\control.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Control Panel
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\control.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1932"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2260C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exeC:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe
runas.exe
User:
Administrator
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\email-worm.win32.mydoom.u.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2896C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.ukill.bat" "C:\Windows\System32\cmd.exeEmail-Worm.Win32.Mydoom.u.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3132C:\Windows\system32\DllHost.exe /Processid:{9DF523B0-A6C0-4EA9-B5F1-F4565C3AC8B8}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3272"C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe" C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\email-worm.win32.mydoom.u.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
682
Read events
662
Write events
14
Delete events
6

Modification events

(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:ProxyBypass
Value:
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:IntranetName
Value:
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:ProxyBypass
Value:
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:delete valueName:IntranetName
Value:
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent
Operation:writeName:Version
Value:
FrankenShteiN
(PID) Process:(2260) Email-Worm.Win32.Mydoom.u.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent
Operation:writeName:Version
Value:
FrankenShteiN
(PID) Process:(1744) control.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1744) control.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
4
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3272Email-Worm.Win32.Mydoom.u.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autostart.exeexecutable
MD5:F169C212B9EB77979DF00BDDE116B400
SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975
2260Email-Worm.Win32.Mydoom.u.exeC:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.ukill.battext
MD5:5D046304506A1E1BBF54499D5021F019
SHA256:6BCED59C8E9D21A2993248551C820054C2EFC90209E51A6593388A99DFD59534
2260Email-Worm.Win32.Mydoom.u.exeC:\Users\Administrator\AppData\Local\Temp\tmp791A.tmpcompressed
MD5:FF4735203E6C7239A8394B41A7E29301
SHA256:27CAD13A609240221514ABC028A5AE4EB9CDE5C3FADBB2DB2BA946F9DB655611
2260Email-Worm.Win32.Mydoom.u.exeC:\Users\Administrator\AppData\Local\Temp\tmp791B.tmpexecutable
MD5:F169C212B9EB77979DF00BDDE116B400
SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975
3272Email-Worm.Win32.Mydoom.u.exeC:\Users\admin\AppData\Local\Temp\tmpC575.tmpcompressed
MD5:993B8E9342B27331AFEA46879857F85E
SHA256:903F5B3ECBDBB94DA1AE5521903B199811DF04A118875AA6C7820E1CE9D4BC7D
3272Email-Worm.Win32.Mydoom.u.exeC:\Users\admin\AppData\Local\Temp\tmpC585.tmpexecutable
MD5:F169C212B9EB77979DF00BDDE116B400
SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975
3272Email-Worm.Win32.Mydoom.u.exeC:\Windows\System32\windrv32.exeexecutable
MD5:F169C212B9EB77979DF00BDDE116B400
SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
23
DNS requests
31
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3272
Email-Worm.Win32.Mydoom.u.exe
17.57.165.2:25
mx-in.g.apple.com
APPLE-ENGINEERING
US
whitelisted
3272
Email-Worm.Win32.Mydoom.u.exe
192.254.190.168:25
onlineconnections.com.au
UNIFIEDLAYER-AS-1
US
unknown
3272
Email-Worm.Win32.Mydoom.u.exe
64.29.151.236:25
ismtp.sitestar.everyone.net
INFB2-AS
US
whitelisted
3272
Email-Worm.Win32.Mydoom.u.exe
131.111.8.146:25
mx.cam.ac.uk
Jisc Services Limited
GB
whitelisted
3272
Email-Worm.Win32.Mydoom.u.exe
194.104.108.22:25
de-smtp-inbound-1.mimecast.com
Mimecast Services Limited
DE
suspicious
3272
Email-Worm.Win32.Mydoom.u.exe
51.81.61.70:25
mx01.earthlink-vadesecure.net
OVH SAS
US
unknown
3272
Email-Worm.Win32.Mydoom.u.exe
103.168.172.223:25
in1-smtp.messagingengine.com
Cloudflare London, LLC
AU
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
apple.com
whitelisted
mx-in.g.apple.com
  • 17.57.165.2
whitelisted
openoffice.org
whitelisted
mx1-lw-eu.apache.org
whitelisted
mx1-lw-us.apache.org
whitelisted
mx2-lw-eu.apache.org
whitelisted
mx2-lw-us.apache.org
whitelisted
onlineconnections.com.au
  • 192.254.190.168
unknown
bryson.demon.co.uk
whitelisted

Threats

No threats detected
No debug info