Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:46
Behavioral task
behavioral1
Sample
Worm.Win32.Mydoom.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Worm.Win32.Mydoom.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Mydoom.exe
-
Size
41KB
-
MD5
b732c35773157dad9d09506d47577340
-
SHA1
76d64fff0f59b1bbcdba891fc4cf1dd851c462c0
-
SHA256
5851085fd7c81bbd629d3145500cbbea1d499b80a044b5f1f2a736f66d0dd69b
-
SHA512
b5600594bc4d012fa802d4e49d37da496a67c7c0193658031b65e3fdc72724fda6c86068a62f82bd063ee04fc812a9cf9cd5a550bf4cd72a761b33ce73d28940
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/6:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2132-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2132-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2132-39-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2132-135-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2132-168-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2132-175-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 3132 services.exe -
Processes:
resource yara_rule behavioral2/memory/2132-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-6-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/2132-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2132-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2132-39-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-40-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmpB1F8.tmp upx behavioral2/memory/2132-135-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-136-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2132-168-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3132-171-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2132-175-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3132-176-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
services.exeWorm.Win32.Mydoom.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" Worm.Win32.Mydoom.exe -
Drops file in Windows directory 3 IoCs
Processes:
Worm.Win32.Mydoom.exedescription ioc process File opened for modification C:\Windows\java.exe Worm.Win32.Mydoom.exe File created C:\Windows\java.exe Worm.Win32.Mydoom.exe File created C:\Windows\services.exe Worm.Win32.Mydoom.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Worm.Win32.Mydoom.exeservices.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm.Win32.Mydoom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Worm.Win32.Mydoom.exedescription pid process target process PID 2132 wrote to memory of 3132 2132 Worm.Win32.Mydoom.exe services.exe PID 2132 wrote to memory of 3132 2132 Worm.Win32.Mydoom.exe services.exe PID 2132 wrote to memory of 3132 2132 Worm.Win32.Mydoom.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Mydoom.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
160B
MD57a5fff05a6994e0b3c0d78723cf4b422
SHA176c8de482262e29847b6db8e4c2a283114aafd4c
SHA2568b3ffaa680331191553a6e7b1e0ae5f007bba68a4f5275bb4f3f4313d6c9e455
SHA512eda96b462e30f7f92d327841369614e06057507d1a80e04fe8ab5c8e234e43401a4908fd16bea516c55074449be328c3f4f35e77d5b4a72be3c8e89090619572
-
Filesize
41KB
MD5ba1211faadf8f054a450d280337cf0ce
SHA120efcd568405ad9c0e753697c2f6ee6430248a41
SHA2567b73bb85b883a4c80523543fe6f6352580867e5970d36689ad3220bfff7d31ad
SHA512d7f6bcf6460a8c6cc124d0618e7998a9c5179396a41f66f914c1bf7e60921ecd63eea45dd4cf38a5486395bed741e7940bb16190ac3a3ad21b8ff4e3a68c9e54
-
Filesize
192B
MD5d87b75649ab94b97e9866b8dfbf088a1
SHA13e13142e99737abf7bf32a5592d80f1863fb12a5
SHA256f15e7746d2586bdd2015e76291eb821b877d1a9cece52aa62fc4e9ee5247c258
SHA51256bfc82f71a5cad438e8a435ed31592b8d3dcf9f700d1fbd32c9ca400d7e7c9c5a327436cb1d101bcaff6a018762e7282c9945bb0b1a2c116b526f38f1451bb1
-
Filesize
192B
MD5ec5df05e600b5d9432302279e4c20177
SHA1e13c873db7223155c8c42d2904eaba27c6b7a7fc
SHA256779348bb03427b4f4815f71624dccafa1a735a4ac168034ee72408f517210f85
SHA5128bf9ad5f44cf584fb52d28336c666dc545ef57bddd15765db15d656dfd35e26005090dba22b9621bce59ac4e65af5c5f03a2d00a9db63fb7b9fa8a8908c783ea
-
Filesize
192B
MD5dea0fb93be280526bf14b5fec9a57f03
SHA12b0008a4fb29c562d04c9d0e32207382f554e9ac
SHA256acee906d0ee7e8994469e5757b640b44963098886ddf4b0b6cbd644b81cebcd6
SHA512a742c6f6cd178e1311148a64675b265cffb4c876295634a3fe3fb436cc3d250da94c0a18e919656120213940b1594c58cc0f2459dec762213f427fe09fd6c13b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2