Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 14:05
Behavioral task
behavioral1
Sample
58ae8170e121885c368b124aa5ae9a50N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
58ae8170e121885c368b124aa5ae9a50N.exe
Resource
win10v2004-20240802-en
General
-
Target
58ae8170e121885c368b124aa5ae9a50N.exe
-
Size
29KB
-
MD5
58ae8170e121885c368b124aa5ae9a50
-
SHA1
d73646c4ec8d66c25a73ba3d4288ea82604c40cc
-
SHA256
b85892920704ba598a6514f5a123926b4d43c439c98d4c3ff6de88779e2c6c4e
-
SHA512
9dd5b5218ef2510c8d8d6c5e443f063bf988b1bd3215313490d68f3d3d89419aff72cf098da8b79962ab3456ab050b42e595f0656508e114e5cd91b97cd25354
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/LS:AEwVs+0jNDY1qi/qzS
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/2720-2-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2720-15-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2720-42-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2720-71-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2720-73-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2720-78-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 2812 services.exe -
resource yara_rule behavioral1/memory/2720-2-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2720-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x000800000001568f-9.dat upx behavioral1/memory/2720-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2812-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2720-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2812-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2812-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-58.dat upx behavioral1/memory/2720-71-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2812-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2720-73-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2812-74-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2720-78-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2812-79-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 58ae8170e121885c368b124aa5ae9a50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 58ae8170e121885c368b124aa5ae9a50N.exe File opened for modification C:\Windows\java.exe 58ae8170e121885c368b124aa5ae9a50N.exe File created C:\Windows\java.exe 58ae8170e121885c368b124aa5ae9a50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58ae8170e121885c368b124aa5ae9a50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2812 2720 58ae8170e121885c368b124aa5ae9a50N.exe 30 PID 2720 wrote to memory of 2812 2720 58ae8170e121885c368b124aa5ae9a50N.exe 30 PID 2720 wrote to memory of 2812 2720 58ae8170e121885c368b124aa5ae9a50N.exe 30 PID 2720 wrote to memory of 2812 2720 58ae8170e121885c368b124aa5ae9a50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ae8170e121885c368b124aa5ae9a50N.exe"C:\Users\Admin\AppData\Local\Temp\58ae8170e121885c368b124aa5ae9a50N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ac11d33f5ed28b28a9f4c749f73c9e53
SHA1de0c586f52dbead8cb1da6e4f91bdb3712a07312
SHA256598760502df97f88cb1eb8ec41f77f13b0ca5bb803bbdc50ab35fe7e1c9e48d9
SHA512d397e666843cb36362a0cd83f9e9aa5b6a5f780da7b67d13416eb0a47afd83089bd6678b8390afec8299388762e4bf14abf06da2b495fadf05cbe6515bf9fc95
-
Filesize
384B
MD580f5d6af185772641a62fd75ba50b742
SHA11280ead69134ac2d57799f46afba677cbd90667f
SHA2568e4c0390c2f2b5c4a33cbcda96b78b680d6c7ea19d961d077f3859e626c76732
SHA512294485fd6cf3defed6f82b2478db1386b087ffea940e5e53847e2502a050a37cd61f40134cbfe83e0e6406d6bde7462250f559e399f9dc856230e738ea268c72
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2