Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 02:39
Behavioral task
behavioral1
Sample
9f285323e8ffaa84ed0a7c679f2275e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9f285323e8ffaa84ed0a7c679f2275e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9f285323e8ffaa84ed0a7c679f2275e0N.exe
-
Size
41KB
-
MD5
9f285323e8ffaa84ed0a7c679f2275e0
-
SHA1
3e36f18fee4da1e0783cbf5e9bcce3ca9c843909
-
SHA256
fe00444ffe45d0c359fc7d3a0e3b955726cb48ac4daee9ed6c1f390ecc1e4754
-
SHA512
b1efb27c9aae97d9b24850e217d802dee0d7fb27f0aee9fb6ae17a505ec782161951e564db31ba0d36186bfb2f6945fc8b4dbd7f68a3c2082823a43ae85d15ec
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/r:AEwVs+0jNDY1qi/qD
Malware Config
Signatures
-
Detects MyDoom family 4 IoCs
resource yara_rule behavioral1/memory/1708-17-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1708-50-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1708-77-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1708-84-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 1952 services.exe -
resource yara_rule behavioral1/memory/1708-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/files/0x0008000000015dfe-6.dat upx behavioral1/memory/1952-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1708-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1952-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-34-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-46-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-51-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1708-50-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/files/0x0005000000004ed7-64.dat upx behavioral1/memory/1708-77-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1952-78-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1952-80-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1708-84-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1952-85-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9f285323e8ffaa84ed0a7c679f2275e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 9f285323e8ffaa84ed0a7c679f2275e0N.exe File created C:\Windows\services.exe 9f285323e8ffaa84ed0a7c679f2275e0N.exe File opened for modification C:\Windows\java.exe 9f285323e8ffaa84ed0a7c679f2275e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f285323e8ffaa84ed0a7c679f2275e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1952 1708 9f285323e8ffaa84ed0a7c679f2275e0N.exe 30 PID 1708 wrote to memory of 1952 1708 9f285323e8ffaa84ed0a7c679f2275e0N.exe 30 PID 1708 wrote to memory of 1952 1708 9f285323e8ffaa84ed0a7c679f2275e0N.exe 30 PID 1708 wrote to memory of 1952 1708 9f285323e8ffaa84ed0a7c679f2275e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f285323e8ffaa84ed0a7c679f2275e0N.exe"C:\Users\Admin\AppData\Local\Temp\9f285323e8ffaa84ed0a7c679f2275e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128B
MD5a2f8793e9856de39cb7b31b98a13475c
SHA1ab7396a88095131235e167d97810234636095a44
SHA256d4c0482156f4bd3cd601cc9372bc7ea9bbaaf00b6b38d6a5f96aeb7139a88367
SHA5123382549353fe88d2efcc4d53fc4ad412bda388eb3cce7c07503708438101c5c205fad99ed6bfc2377e65a2cbe7f5bf656d329a7a8d562030f80ed4dd41f8d4f1
-
Filesize
41KB
MD5cbb56ac9ba58abe599914f75ea6df514
SHA1dc53d1853492763c79fa2f44d1a31b15cac72508
SHA256b48fe650c3af1ab3127eadfa059b744c5028483517e921af6138014a90fcdcf3
SHA512deae8a7d1326d9dd970170653827c1a01cddf22d41e6d004d9672f5358d9d8d12d62bf3fa630eea95a8b5894e746ca6df2940bb17a2ed8785ee1cbe77b269ee7
-
Filesize
160B
MD55e37f9b202348c3a39afba7031003376
SHA1ad402c8d6243cf53b30b63bec1852cf9e607611d
SHA256582be63c098f99874660413177645afb507031553732af67d0b3b4e3d36fff5d
SHA5122c224eb8a5094c7ef14a1b44eb430e246a6a4d4f7efdad990e6b2822cfaed82693864788e0e4be106c4abaaf7e6259d89fa8ebbca58ed397fd0697e7d7697705
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2