Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 15:21
Behavioral task
behavioral1
Sample
03ede6eddb45e208a383d9b6eea037f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
03ede6eddb45e208a383d9b6eea037f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
03ede6eddb45e208a383d9b6eea037f0N.exe
-
Size
29KB
-
MD5
03ede6eddb45e208a383d9b6eea037f0
-
SHA1
24551f1c1e60c927d2de02455d486a2b34a75b87
-
SHA256
7404bddc81ccde6e70d49d3c6482abf622b4659654d8bd8c14098512c02702fe
-
SHA512
13f8be02ecd0ec2bba026e8783b37a6196ecf0b0f9e7a7ecdd4b7338ab4c23166fec53a58c50018a3937b667c819f529eec97c165412c2c87f3ea32712829428
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Gi:AEwVs+0jNDY1qi/qei
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral2/memory/316-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/316-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/316-39-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/316-148-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/316-152-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/316-159-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 2780 services.exe -
resource yara_rule behavioral2/memory/316-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023459-4.dat upx behavioral2/memory/2780-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/316-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/316-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/316-39-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000900000002346b-50.dat upx behavioral2/memory/316-148-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/316-152-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-153-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2780-155-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/316-159-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2780-160-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 03ede6eddb45e208a383d9b6eea037f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 03ede6eddb45e208a383d9b6eea037f0N.exe File opened for modification C:\Windows\java.exe 03ede6eddb45e208a383d9b6eea037f0N.exe File created C:\Windows\java.exe 03ede6eddb45e208a383d9b6eea037f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03ede6eddb45e208a383d9b6eea037f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 316 wrote to memory of 2780 316 03ede6eddb45e208a383d9b6eea037f0N.exe 83 PID 316 wrote to memory of 2780 316 03ede6eddb45e208a383d9b6eea037f0N.exe 83 PID 316 wrote to memory of 2780 316 03ede6eddb45e208a383d9b6eea037f0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\03ede6eddb45e208a383d9b6eea037f0N.exe"C:\Users\Admin\AppData\Local\Temp\03ede6eddb45e208a383d9b6eea037f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD57532c682db6600608c135c1d103946f7
SHA17495e02046c95fd10f09deefab56a90406aba73c
SHA256785aff7f05e5b72f4f78ef648b07807a281a41bae096db84194145d017d5c825
SHA512bdef528d37a8480683f8fef0e09a1f55591c033be3ea71b37b5e919508338cf3c4b17aa228804657a21f981f3e8415d2f0f52896ea88436f318d03a9873d5f35
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD511afa8f76cfd975be1980f606f41d6de
SHA18cd9a8e5bf0d44fb0e9b7cbe25a1f5d09c45cd1e
SHA256b30637244d1fc5a4dd94b6362454ffe733d62d37450e82a3cbb24245b8d290bf
SHA512326b8eb5b781bdd42cb1643907620c1e37d6aab8dcc4a45cc822aabd92c157f19c93051997568ac8d4f188196c9c0925b94058817c15677c6b49d1222f424e3c
-
Filesize
384B
MD59db5e3e7257afcf10eccf5f00406b1b5
SHA1bc86c1e5afc93ed4d2cf3a352aa2416b915281cb
SHA256fc2eff970d048133db19a997e5c3146dad1bb7eca3dc58c6dd6522d2f54f0d58
SHA5123a452326b3c79eae843acbaf951a5e5f4b628cb6bce9ea7b525cafc20a031cebfffbd31404178a1d46bb7a526e79acc3791b8c46c9ce972316e32c9c0d00affd
-
Filesize
384B
MD5df2bcc9f3f37169a7e4349a22c2e805b
SHA1d3ff3660f37562d6ca62ddba67e4e27a6863437d
SHA2561d94772f3e121e438c413818636a9d3e929efa396e6912cf24758b4dfed6a214
SHA512dc9894a47546a54665085b3ae46213386c21751940cf43dcd7f51813c78ba8e129c93ff99ce0cf56b10becf0badb0d454a10cc795c3ba0bc0740e8f89840cb99
-
Filesize
384B
MD58403a3a2b39164a70ce12c2938bf7faa
SHA17d8f512779ab8daba67d33e1d4afe3afd1326cdc
SHA256797335667704915e0699094d31140a3ba709215705293c3632149f6b6d0bcfbd
SHA512a8254aecc4b6d619883546ce60d35ff2e5a483b04aad5dac7f01b20518ca8d4b32b776afd95bcf5d7146a92f132687b8ca25b66914b7b708cc0ea7fa4be25319
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2