Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:17
Behavioral task
behavioral1
Sample
Worm.Win32.Mydoom.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Worm.Win32.Mydoom.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Mydoom.exe
-
Size
41KB
-
MD5
193d0a244c8df9d48e37e8c0de694790
-
SHA1
61ad5f4bf01f8ed36a4ccef66be6ee440b0bcfa7
-
SHA256
3b486168388e5176f890d1e706c1c0cfe738758fc10a34d036df693275963031
-
SHA512
00cef3add273e01306421d5600fc960a98b333ff1d6756704aa39cec993750f012d740c880ceb2a9db2f7d63f4be461d2ca5335bde2705a67d2854376a78f8ad
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Detects MyDoom family 2 IoCs
resource yara_rule behavioral2/memory/2896-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2896-56-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 1372 services.exe -
resource yara_rule behavioral2/memory/2896-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1372-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x00080000000234db-4.dat upx behavioral2/memory/2896-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1372-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1372-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2896-56-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1372-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0004000000000705-67.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" Worm.Win32.Mydoom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe Worm.Win32.Mydoom.exe File created C:\Windows\services.exe Worm.Win32.Mydoom.exe File opened for modification C:\Windows\java.exe Worm.Win32.Mydoom.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm.Win32.Mydoom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1372 2896 Worm.Win32.Mydoom.exe 84 PID 2896 wrote to memory of 1372 2896 Worm.Win32.Mydoom.exe 84 PID 2896 wrote to memory of 1372 2896 Worm.Win32.Mydoom.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55a359416f834e9dd38748488ca4005af
SHA18bfcc046f4d162836c591022f1f80fe33f196c9a
SHA2561d26cce4af558d0fa098d9746d14fc1b35f5b12958e7e0293ee449dbcf67f25f
SHA51240b99d3a6fb1b470dbcc3c05a1ed4217e5b5316073fb36f84bbf7d3de9eac3993a25921b697f32a2ebbc3d113fc597878b862d5ea871daa08dbb286d5c7cd712
-
Filesize
160B
MD5e4d3df598e11c612a97f1542e871d0f9
SHA1111236d63c3ec70f586670cf579b31c89a5794f4
SHA25630db994f107756f0c70af840aae4f52469fbe1696fd81f78f3f70450f18e7ea7
SHA512361381bbf9a31de79f1888d62f75477a309f43461e714627d9cf2b6ee479799ab60982353dbff2ba6a37f065517ebc1a5435feaaf0c0aefd118c715590c2052b
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2