Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 21:29
Behavioral task
behavioral1
Sample
738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe
Resource
win10v2004-20241007-en
General
-
Target
738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe
-
Size
29KB
-
MD5
dda61a1a25501f7ad9c5204f56b02360
-
SHA1
6fe8dd1df69bc4a1947ee00b5d0e59c8da534912
-
SHA256
738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08
-
SHA512
f9c8319ac832255beb835f49ee2fc04cb76a03d73f4e3598be4829963a1986244007aace1a48b8532549b8fc7be96dc23897f63e3954b7ec512c0d6a752b05fc
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/F:AEwVs+0jNDY1qi/q9
Malware Config
Signatures
-
Detects MyDoom family 7 IoCs
resource yara_rule behavioral2/memory/1388-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-108-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-145-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-149-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-156-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1388-192-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 3348 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/1388-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023c8f-4.dat upx behavioral2/memory/3348-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0005000000011940-48.dat upx behavioral2/memory/1388-108-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-109-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-145-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-149-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3348-152-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-156-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3348-157-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1388-192-0x0000000000500000-0x0000000000510200-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe File created C:\Windows\services.exe 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe File opened for modification C:\Windows\java.exe 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 3348 1388 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe 83 PID 1388 wrote to memory of 3348 1388 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe 83 PID 1388 wrote to memory of 3348 1388 738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe"C:\Users\Admin\AppData\Local\Temp\738319cac56c69167840e299f6cdc83cc8c9747e3a40dd9c6b50cf57babbbc08N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
320B
MD5dded7efe0c0fbbfc3a709c2a46962f5b
SHA1f6e1d298832d94e31f22494a21f92490e279b869
SHA256bcb8c541237cc5a913cea0f5055067022452c07b9f63074fc2a0421be5b02358
SHA512de3c674b2a8ebc6a601260711e874e575b460300940bf0081dc75913dafbcc197afe0d8d00938f06939f61fc3eecd564f43dbc25cec76dff5b540b2e06cfe0cc
-
Filesize
29KB
MD5f094c4c5baaf6fbc29a6e74021a15f7e
SHA1b135b2da0abc6af827743c18633925481ae2479c
SHA256917812e665670ac18d892b1afe7f51bed0404fc7d6be87ed4ce0f008c959356c
SHA512d74666237b005af06de91ead04cda0b6430bfbbd9b364b5f0a1220ade8f4f9dfb031c029960ce0250861b7c810f8386ba3ef59e4b45cf3815b9cae0467772b93
-
Filesize
352B
MD513e7bea26cbc711887e6953cb51011e6
SHA175e64c91ae96aa87a4ab461ae3c13eef2c66eab1
SHA256940ab254063583204dc6736c61db726b02e7f7cf1004abaa6a461d06c6757145
SHA51233fb7f83cda4829f8758689a535d979937eb243ff59affd02cc7f7381adec9e619b608fa36af5bfbefe979ce74969362584f4996fd2fb6f623255d44c5a16abb
-
Filesize
352B
MD5fcd85ba3b7d9463770f1efe23b30d822
SHA1c73356fdd8b95579cdf8c58911859c0292c4feeb
SHA256b6093937cba2150b9f7500ff33d3c507c8f96427ea6b19aeb17c034b31f70d7b
SHA512dfa8a98a3cdbd20eb6d5b6995a0cca7f425e9c8802a39f71c32e7d02fb04f16d29328d1986e0537f51173a5f4b18877a32d8e998f523c44f1d15e2615f0dba19
-
Filesize
352B
MD5138321958f35ce138b708324a14b1797
SHA1cd9bf59b76fd74814428ef24480a5213e814a5fc
SHA256e772aeacf289eb1c06491e5dca2f22039c6e04ab8c83aa9f5b6a730c4a4b2215
SHA512fe6c92ab896158049ecc8370b6cc55af2d1e2901875892a2691ad26aed222a0eca62ec9b9f4d546cb9da8f6100f4367e1034529ff8de3cc095d768aa28de83b6
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2