Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 07:38
Behavioral task
behavioral1
Sample
e7219f08621feec11218e8dbc5208530N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e7219f08621feec11218e8dbc5208530N.exe
Resource
win10v2004-20240802-en
General
-
Target
e7219f08621feec11218e8dbc5208530N.exe
-
Size
29KB
-
MD5
e7219f08621feec11218e8dbc5208530
-
SHA1
c9a582b50ad0a67222071b007500bdcd1db67813
-
SHA256
b1afba8bec8c72b8ac0acee370bd5aa187c41bfff470c9214b8ccd55e7882ca5
-
SHA512
357683d308f135a1a151a02dae6976727892dfb87082d8a0f62555eb9572bccbbaf6c805f22319c8566239195edfd746d6ec0f237c61b5b9a2a252fc2b5ae2c3
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/M:AEwVs+0jNDY1qi/q0
Malware Config
Signatures
-
Detects MyDoom family 8 IoCs
resource yara_rule behavioral2/memory/1028-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-27-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-112-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-148-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-155-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-181-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-219-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1028-252-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 2072 services.exe -
resource yara_rule behavioral2/memory/1028-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023433-4.dat upx behavioral2/memory/2072-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2072-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2072-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2072-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-27-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0009000000023446-38.dat upx behavioral2/memory/1028-112-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-113-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-148-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2072-151-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-155-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-156-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2072-182-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-181-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1028-219-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-220-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1028-252-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2072-256-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" e7219f08621feec11218e8dbc5208530N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe e7219f08621feec11218e8dbc5208530N.exe File created C:\Windows\services.exe e7219f08621feec11218e8dbc5208530N.exe File opened for modification C:\Windows\java.exe e7219f08621feec11218e8dbc5208530N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7219f08621feec11218e8dbc5208530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2072 1028 e7219f08621feec11218e8dbc5208530N.exe 83 PID 1028 wrote to memory of 2072 1028 e7219f08621feec11218e8dbc5208530N.exe 83 PID 1028 wrote to memory of 2072 1028 e7219f08621feec11218e8dbc5208530N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7219f08621feec11218e8dbc5208530N.exe"C:\Users\Admin\AppData\Local\Temp\e7219f08621feec11218e8dbc5208530N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5d7092ef576c6d93215d220cb4c938863
SHA106b8088c7ba9fd5945892ad048d16aafec813a7a
SHA256d1cf47062b27e8cc9ade7a40a5a2b58501f8323c35d1248ea9b5e4845f0f47cc
SHA512428dbf394095dc1838ae6d88c399d2f44ce561dfacffe371a960e53c5cbeec94fce42103d84fe2e18d7416433ca8e5d1d9d1992f4dee7d101e255375de2c1340
-
Filesize
352B
MD5073c7ead5c7b8ae91d304bc3812d03c7
SHA1507cff60c624921a53d6fe378831ad81c16fc8f5
SHA256bc83293cd83660587be940ee0ad316eb7f95c736338fce5ba520e9e333e67be6
SHA5121cd27564055e061237086211cbc82571ea1d8b2469f7c294b6ff454771770bd8e06b0a7ca8e9666fbf5cec148cd32dacb18db885c77d2b262442870e509bf772
-
Filesize
352B
MD5b0f61f907eff69160f094edbb7b214c2
SHA16e805af3f17eceb5e14939796f240e3c882add83
SHA2567e1bea2eac8ae200dc8d952c652fa41d816a778013b96fe5e452b867ecd7b4a5
SHA5127b0d9d398d2c7f48f0ceb847ee7e9d49357328bee6aa2b6bc1bf60b76c358ad709b89a625c1bc3eb2a298eb775deeab3b2969b8e9e8028eb483b62629523e566
-
Filesize
352B
MD5dc641c97a99f8266de28e9f65a016806
SHA191544defbe1d070ab8f0431ae929643a07ca96c0
SHA2564a8b53c21f92d422c87fa425d67e496e7e46739620944c6feb22b24ffeea633d
SHA5120564622fb1a0cab4db3443f007bdb42e6efb58807dba3a1d2c2e89ceea37108339823abefb3f8381b1a5a9df1e33b037e6c36cd47299b1267c511cfcba72a03f
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2