Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 02:53
Behavioral task
behavioral1
Sample
eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe
Resource
win10v2004-20241007-en
General
-
Target
eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe
-
Size
29KB
-
MD5
089a32130f9cb3aa123970a89109b857
-
SHA1
50e7ff715eebb4c31d4f416cc9f3fdbdb2c39bc7
-
SHA256
eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741
-
SHA512
434517d8dfe560ff3177094c82c7713c8d1de0f704e75fbc58bc72358f923d6397e6e10a4ff4681bf34b6bd85014de53bf4bafc86faef44ac7933a96bbdb6175
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/E:AEwVs+0jNDY1qi/qs
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral2/memory/1528-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1528-51-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1528-120-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1528-175-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1528-177-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 4372 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/1528-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x000b000000023b79-4.dat upx behavioral2/memory/4372-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1528-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4372-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1528-51-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4372-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000d000000023a5a-60.dat upx behavioral2/memory/1528-120-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4372-121-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1528-175-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4372-176-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1528-177-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4372-178-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4372-182-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe File opened for modification C:\Windows\java.exe eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe File created C:\Windows\java.exe eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4372 1528 eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe 83 PID 1528 wrote to memory of 4372 1528 eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe 83 PID 1528 wrote to memory of 4372 1528 eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe"C:\Users\Admin\AppData\Local\Temp\eb7784d7b3bcff39c3292803335028be1b18bf8be0c89e96666c9277fac98741.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5c2500e0d80c6a11835b138bfb702b9ac
SHA17e42b661c92b2a01cc2201dd81e71cb33c146a78
SHA256bf6ee34c799df2a92bfac961cdf70ceae95cd01693694a3e9e136ed7b077ef0c
SHA512734349d9e1527848d7c39317f1107431343b4bb572a66530551d5b397fd330614e2763a0555d17b9271b4141d3fdd6d263139891510a90d7bdf3a19365efbb53
-
Filesize
320B
MD53c71a8c67a7ce13746af90a7ad01d032
SHA11a8b699fd389c3956ae2cf817f65d8c6d432dda1
SHA256c4c332a180ea2611866ad51689ded18a121c10085ceaf8bca3b9449db79be249
SHA5126e7fd57f514a4c70ed802cbb49eb4901c0870fae0e52638f760940bb59c99961f23e387ca52bcfe7d48793d2c201fd103f620a1633c1879bb7572249158dac3a
-
Filesize
320B
MD50af78dd8a7d86136cde5192497c37286
SHA1bc033a9f80bc1005eeab4ce5884bb52d08191885
SHA256f736271d4d9518faf5b8c7632e41f5d687f3a87415ce51e3ca91562e33995c95
SHA51229bb39187134e1286f53d34aff0cf3815a8fce68c106bc7ba2968fe66fea46e186a37f281d91bd05149ddecd3320e47ab6bf14bc5e4404126fa3dee95bc91326
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2