Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:23
Behavioral task
behavioral1
Sample
Worm.Win32.Mydoom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Worm.Win32.Mydoom.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Mydoom.exe
-
Size
40KB
-
MD5
b014ddef4eacf5b0688c1a6499c44150
-
SHA1
2cb479d23c2dbe413e81bd273b1b7917a8a25611
-
SHA256
e292d3b57228b134cef488f119ed69df757a1e6c6b496aaed59a6e4232bf97c6
-
SHA512
591292edcc1192de9d317ed40949ee1bc201ef893f5ad7866639ea228bc9774f065a78c3add2d05dd14e910d705cb91c20fbd33e36476ebc2d66355ef6d3a43b
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHv4:aqk/Zdic/qjh8w19JDHA
Malware Config
Signatures
-
Detects MyDoom family 3 IoCs
resource yara_rule behavioral1/memory/2540-0-0x0000000000500000-0x000000000050D000-memory.dmp family_mydoom behavioral1/memory/2540-9-0x0000000000400000-0x0000000000408000-memory.dmp family_mydoom behavioral1/files/0x001500000000f6b0-43.dat family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 2520 services.exe -
resource yara_rule behavioral1/files/0x0007000000018f80-6.dat upx behavioral1/memory/2520-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-63-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-67-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-294-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2520-369-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" Worm.Win32.Mydoom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe Worm.Win32.Mydoom.exe File created C:\Windows\services.exe Worm.Win32.Mydoom.exe File opened for modification C:\Windows\java.exe Worm.Win32.Mydoom.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm.Win32.Mydoom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Worm.Win32.Mydoom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Worm.Win32.Mydoom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Worm.Win32.Mydoom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Worm.Win32.Mydoom.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2520 2540 Worm.Win32.Mydoom.exe 30 PID 2540 wrote to memory of 2520 2540 Worm.Win32.Mydoom.exe 30 PID 2540 wrote to memory of 2520 2540 Worm.Win32.Mydoom.exe 30 PID 2540 wrote to memory of 2520 2540 Worm.Win32.Mydoom.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43c63f25c1ba3e846ab81e27f0da3a6
SHA1193967e16371ab11bf1df936693c921e9180353e
SHA256f8523d7c2de4a80b8c99b7c407763d1f3582b1eb1d76e0c03109b6964f15e780
SHA5125c441cc3950a055c7db04d214b630a0c12ea080ba1efab7e2c851a14abaa9443fd030578fd031033998e05d400f130db1084340780fd6005cb258c9fd1f108b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534dbda8c09dcaffebb27828dcf9fff1e
SHA17e9b9fcea391f878516530de7d87e1d584c0d861
SHA25661933902e3202d879eef0654a00e89752de06cd02637bf932ef3d417985e0a47
SHA5120a537b6f3b17159c9d420a62731df59872a35ccd9fbeb2e438a49fcc05f303c4901596e3448fda36f3181dca9909c12c78510cc8714676ce688360ecb3361112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb29d031ed120cb9015154431d7542dd
SHA1e96e65d1aa2cdbf300ef0b10bea8b199b93ab0ed
SHA2565901bc0a0830ebc0d0583d6999bbe2979fe501f83cbdb58bf39ffe6dacd3c71a
SHA5126a2b4465f5e9ca50c76d618c9651dd0148389a413cb7ffc9702a38309929ffb5bed12447e74a6822732343f38299d68ade6f42aff7aae5c6388980bce63f19f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c46156a00b1c8e5e97e2173c2fb2160
SHA18d9e06043255ce83c140463f9ce86a66381b912e
SHA256d675274dc90bc90ea45290643859bfe3f61f092ca8183270645c65b84ed83eb4
SHA51260663f259a7a723cbb6acb6411d863e7e52b82c16cbe808b1e6a9176c16be990c915aa92d3355381d63c6417780ae41d14915b915f141521f6c66c500128659a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\default[3].htm
Filesize306B
MD5e0c3b4c8541e5bc3cf19d22ccf8365d6
SHA19ac1347e4dbce09ddacc47ff46b9cb15b01fd77d
SHA25669e3c690688497ac57963720235b9181d6ab79161289aed6bc518f2284e75696
SHA5123c6a7bb5b195dd5e973d180f051ad4979d37bfaa489e6e22c239a2efc007a203c72732496d0db1324a16344606510cba911af242337bd96da4f9832c9f6552aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\search[2].htm
Filesize25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
40KB
MD5ae3c9c9b463153525442e5da61cddbc3
SHA19570556241bc8281a19c4e2c46a8e248496861a2
SHA25658d94306f6b0c24de68ab7352b1ab9525008860123c46301ff3403755e3dd2fe
SHA51210b24fa2a0517c2a4a1c0a962b63c960ea052d7fb0131a7e9bac996e7efe84f929b59fc861a3b8cf65db1446a336fa6834a1a444e6a2baf4a99df00252110d98
-
Filesize
1KB
MD51d6c1e3f90e542eecc586440ca5aaae2
SHA162cd3aebfa8b94ffe6b63c51c7a410e831dbae29
SHA2562f60229c183dc63ea213543ba4273654c2be34a49ac06c77344f74e50cbc5e23
SHA51264af83f86407ebb85b089c88f93dd8b937e3939f732efd92ff5c235e1b477c33a80fca4a840b88a77babd8d540122c47dbcfe298c823d0fdf53d69ac7645c397
-
Filesize
1KB
MD5273e659586b884d64f59b878d91dea23
SHA141ec357d4666ba0c3281e5559dd08cd3d1bb9df4
SHA2566faa24eba5cccfa40e378468c0dec3757793f0ba248897295749e0257f5930eb
SHA512b794e82bb40729ed8264a8152e73de728e750c51eed3a3a18aa6e777fe6679e367845d28a494b3cfb7bd1541e862cd6e84f213c72f04050b0799d24f1c03f739
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2