| download: | /vir/Email-Worm.Win32.Mydoom.u |
| Full analysis: | https://app.any.run/tasks/a55948ea-33ac-44f0-b33a-c7a073d35f08 |
| Verdict: | Malicious activity |
| Analysis date: | December 09, 2024, 23:03:01 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections |
| MD5: | F169C212B9EB77979DF00BDDE116B400 |
| SHA1: | ACF6DE3E87851F70FD76007246389874C66ADBE8 |
| SHA256: | B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975 |
| SSDEEP: | 384:kHrFWTS5x0J8NQnfdVpQ1lw2oWlFElv0xQG2823xEi0lNayKsirEG1Xyl:wFWT7J5nLSXdoWlFxk3NNEG |
| .exe | | | Win32 Executable (generic) (42.8) |
|---|---|---|
| .exe | | | Clipper DOS Executable (19.1) |
| .exe | | | Generic Win/DOS Executable (19) |
| .exe | | | DOS Executable Generic (18.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 20480 |
| InitializedDataSize: | 4096 |
| UninitializedDataSize: | 28672 |
| EntryPoint: | 0xc090 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 828 | "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\timedate.cpl", | C:\Windows\System32\rundll32.exe | — | control.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1744 | "C:\Windows\System32\control.exe" "C:\Windows\system32\timedate.cpl", | C:\Windows\System32\control.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Control Panel Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1932 | "C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe | C:\Windows\System32\runas.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Run As Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2260 | C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe | C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe | runas.exe | ||||||||||||
User: Administrator Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2896 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.ukill.bat" " | C:\Windows\System32\cmd.exe | — | Email-Worm.Win32.Mydoom.u.exe | |||||||||||
User: Administrator Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3132 | C:\Windows\system32\DllHost.exe /Processid:{9DF523B0-A6C0-4EA9-B5F1-F4565C3AC8B8} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3272 | "C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe" | C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.u.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | ProxyBypass |
Value: | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | IntranetName |
Value: | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | ProxyBypass |
Value: | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | delete value | Name: | IntranetName |
Value: | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent |
| Operation: | write | Name: | Version |
Value: FrankenShteiN | |||
| (PID) Process: | (2260) Email-Worm.Win32.Mydoom.u.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent |
| Operation: | write | Name: | Version |
Value: FrankenShteiN | |||
| (PID) Process: | (1744) control.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1744) control.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3272 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autostart.exe | executable | |
MD5:F169C212B9EB77979DF00BDDE116B400 | SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975 | |||
| 2260 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\admin\Desktop\Email-Worm.Win32.Mydoom.ukill.bat | text | |
MD5:5D046304506A1E1BBF54499D5021F019 | SHA256:6BCED59C8E9D21A2993248551C820054C2EFC90209E51A6593388A99DFD59534 | |||
| 2260 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\Administrator\AppData\Local\Temp\tmp791A.tmp | compressed | |
MD5:FF4735203E6C7239A8394B41A7E29301 | SHA256:27CAD13A609240221514ABC028A5AE4EB9CDE5C3FADBB2DB2BA946F9DB655611 | |||
| 2260 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\Administrator\AppData\Local\Temp\tmp791B.tmp | executable | |
MD5:F169C212B9EB77979DF00BDDE116B400 | SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975 | |||
| 3272 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\admin\AppData\Local\Temp\tmpC575.tmp | compressed | |
MD5:993B8E9342B27331AFEA46879857F85E | SHA256:903F5B3ECBDBB94DA1AE5521903B199811DF04A118875AA6C7820E1CE9D4BC7D | |||
| 3272 | Email-Worm.Win32.Mydoom.u.exe | C:\Users\admin\AppData\Local\Temp\tmpC585.tmp | executable | |
MD5:F169C212B9EB77979DF00BDDE116B400 | SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975 | |||
| 3272 | Email-Worm.Win32.Mydoom.u.exe | C:\Windows\System32\windrv32.exe | executable | |
MD5:F169C212B9EB77979DF00BDDE116B400 | SHA256:B30CBB9075AF952F3DBC62C7A0442212CA665801717913A7D7F9240E0C954975 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1108 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3272 | Email-Worm.Win32.Mydoom.u.exe | 17.57.165.2:25 | mx-in.g.apple.com | APPLE-ENGINEERING | US | whitelisted |
3272 | Email-Worm.Win32.Mydoom.u.exe | 192.254.190.168:25 | onlineconnections.com.au | UNIFIEDLAYER-AS-1 | US | unknown |
3272 | Email-Worm.Win32.Mydoom.u.exe | 64.29.151.236:25 | ismtp.sitestar.everyone.net | INFB2-AS | US | whitelisted |
3272 | Email-Worm.Win32.Mydoom.u.exe | 131.111.8.146:25 | mx.cam.ac.uk | Jisc Services Limited | GB | whitelisted |
3272 | Email-Worm.Win32.Mydoom.u.exe | 194.104.108.22:25 | de-smtp-inbound-1.mimecast.com | Mimecast Services Limited | DE | suspicious |
3272 | Email-Worm.Win32.Mydoom.u.exe | 51.81.61.70:25 | mx01.earthlink-vadesecure.net | OVH SAS | US | unknown |
3272 | Email-Worm.Win32.Mydoom.u.exe | 103.168.172.223:25 | in1-smtp.messagingengine.com | Cloudflare London, LLC | AU | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
apple.com |
| whitelisted |
mx-in.g.apple.com |
| whitelisted |
openoffice.org |
| whitelisted |
mx1-lw-eu.apache.org |
| whitelisted |
mx1-lw-us.apache.org |
| whitelisted |
mx2-lw-eu.apache.org |
| whitelisted |
mx2-lw-us.apache.org |
| whitelisted |
onlineconnections.com.au |
| unknown |
bryson.demon.co.uk |
| whitelisted |