Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:07
Behavioral task
behavioral1
Sample
a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe
Resource
win10v2004-20240802-en
General
-
Target
a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe
-
Size
29KB
-
MD5
7c81e3f5aa577585b12dbd8b0c810c4b
-
SHA1
fcbca6d079317fb2d0798b45d04541ff28d0e62b
-
SHA256
a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516
-
SHA512
f0fb8661a1f7ecf3a0d8409d164da6573b821b8d69271d7876f278865bedb66a69b976e939e88e7f59f2e5153de540a7c2b7aa19363d0d1191d9d247c186567e
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/+:AEwVs+0jNDY1qi/qW
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/2292-15-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2292-47-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2292-74-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2292-78-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2292-83-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2292-90-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 292 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2292-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x0008000000016d5a-7.dat upx behavioral1/memory/2292-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2292-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-66.dat upx behavioral1/memory/2292-74-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-75-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2292-78-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-79-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2292-83-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-84-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/292-86-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2292-90-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/292-91-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe File created C:\Windows\java.exe a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe File created C:\Windows\services.exe a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 292 2292 a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe 28 PID 2292 wrote to memory of 292 2292 a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe 28 PID 2292 wrote to memory of 292 2292 a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe 28 PID 2292 wrote to memory of 292 2292 a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe"C:\Users\Admin\AppData\Local\Temp\a60f7961793795d7b0ae645aba2a8eaf21bef8a96bc9268a78f2896ca71b2516.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c81b1591a96acee90cab097a8a136565
SHA1fb4aacffad245990ac207483b8407ad74695ff72
SHA256d29ad1b4b425506a12798021650bfe7be28a3d7d700358a78170e467f7e70ee7
SHA512f36010a9490618529a64adaec402ceb79a5bc59c1ac02df22ae03702c91c98228d9b99fe64f4f1394a8a75e680e7eb8cbe1cf257610c046ed91a996e6f38a803
-
Filesize
320B
MD571e51db9896bea78f86036d60c9cd819
SHA1063e699302c31d6d6a88bf1e24d9dd568d2d9b13
SHA2564dd21fbc9cdc427e1c52a65034a0b62b95c8a52dde4a9fbdb689a501c54b18c4
SHA512871d5774acb1ec4f942962305fda40208a80937cb8bf358d5da8f7ebcb3c2be2ff54969e65178be863aac64a0311be8714b1efa86b6b3971450a0357812f0a82
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2