Overview
overview
10Static
static
517-10-2024...QW.exe
windows7-x64
17-10-2024...QW.exe
windows10-2004-x64
17-10-2024...er.exe
windows7-x64
717-10-2024...er.exe
windows10-2004-x64
717-10-2024...ys.exe
windows7-x64
917-10-2024...ys.exe
windows10-2004-x64
917-10-2024...er.exe
windows7-x64
317-10-2024...er.exe
windows10-2004-x64
317-10-2024...er.exe
windows7-x64
317-10-2024...er.exe
windows10-2004-x64
317-10-2024...re.exe
windows7-x64
1017-10-2024...re.exe
windows10-2004-x64
1017-10-2024...ix.exe
windows7-x64
117-10-2024...ix.exe
windows10-2004-x64
317-10-2024...nt.exe
windows7-x64
1017-10-2024...nt.exe
windows10-2004-x64
1017-10-2024...re.exe
windows7-x64
517-10-2024...re.exe
windows10-2004-x64
517-10-2024...NG.dll
windows7-x64
317-10-2024...NG.dll
windows10-2004-x64
317-10-2024...op.exe
windows7-x64
717-10-2024...op.exe
windows10-2004-x64
717-10-2024...er.exe
windows7-x64
717-10-2024...er.exe
windows10-2004-x64
717-10-2024...an.exe
windows7-x64
317-10-2024...an.exe
windows10-2004-x64
317-10-2024...ie.exe
windows7-x64
517-10-2024...ie.exe
windows10-2004-x64
517-10-2024...oe.exe
windows7-x64
717-10-2024...oe.exe
windows10-2004-x64
717-10-2024...ge.exe
windows7-x64
617-10-2024...ge.exe
windows10-2004-x64
6Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 22:34
Behavioral task
behavioral1
Sample
17-10-2024 #20/AQW.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17-10-2024 #20/AQW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
17-10-2024 #20/Adobe Reader.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
17-10-2024 #20/Adobe Reader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
17-10-2024 #20/Barys.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
17-10-2024 #20/Barys.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
17-10-2024 #20/Butcher Crypter.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
17-10-2024 #20/Butcher Crypter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
17-10-2024 #20/Dynamer.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
17-10-2024 #20/Dynamer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
17-10-2024 #20/Explore.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
17-10-2024 #20/Explore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
17-10-2024 #20/FloodFix.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
17-10-2024 #20/FloodFix.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
17-10-2024 #20/Flyagent.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
17-10-2024 #20/Flyagent.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
17-10-2024 #20/InstallCore.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
17-10-2024 #20/InstallCore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
17-10-2024 #20/MSRATING.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
17-10-2024 #20/MSRATING.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
17-10-2024 #20/MulDrop.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
17-10-2024 #20/MulDrop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
17-10-2024 #20/TSULoader.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
17-10-2024 #20/TSULoader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
17-10-2024 #20/UtilMan.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
17-10-2024 #20/UtilMan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
17-10-2024 #20/Zombie.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
17-10-2024 #20/Zombie.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
17-10-2024 #20/app stroe.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
17-10-2024 #20/app stroe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
17-10-2024 #20/assemblychange.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
17-10-2024 #20/assemblychange.exe
Resource
win10v2004-20241007-en
General
-
Target
17-10-2024 #20/Flyagent.exe
-
Size
29KB
-
MD5
05d2ca103f78fad50c5c5e346a53ccb0
-
SHA1
8dfaaddbce919c74ef2d60a70936d8fbd97c3287
-
SHA256
3c2ace077b2c126a3188d787a1369fd80424c55ec39b81c898094495608ababf
-
SHA512
3e7c846900c0f713c63a87ea0eb755a8df11e20c5d1dd97714efc76ea2e294135c7c6d329f7be77471c21ebf6f595d915056d9d1418f3e8c738917316b3cdd17
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/rK:AEwVs+0jNDY1qi/qW
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
Processes:
resource yara_rule behavioral16/memory/2468-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral16/memory/2468-56-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral16/memory/2468-61-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral16/memory/2468-153-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral16/memory/2468-174-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 2344 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Flyagent.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" Flyagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Processes:
resource yara_rule behavioral16/memory/2468-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-5-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Windows\services.exe upx behavioral16/memory/2468-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2344-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2468-56-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2468-61-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-62-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmp9DAD.tmp upx behavioral16/memory/2468-153-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-154-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral16/memory/2468-174-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral16/memory/2344-175-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
Processes:
Flyagent.exedescription ioc process File opened for modification C:\Windows\java.exe Flyagent.exe File created C:\Windows\java.exe Flyagent.exe File created C:\Windows\services.exe Flyagent.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Flyagent.exeservices.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flyagent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Flyagent.exedescription pid process target process PID 2468 wrote to memory of 2344 2468 Flyagent.exe services.exe PID 2468 wrote to memory of 2344 2468 Flyagent.exe services.exe PID 2468 wrote to memory of 2344 2468 Flyagent.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Flyagent.exe"C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Flyagent.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5243961aa882e8f8c4d0e18e2a9f4ead5
SHA1811759a7bd2f4fc1dc75d8562ee4dd2e370d6097
SHA25629d5fc260625d0898f2898b073d9df7560a4565bf0240dfc42f304731bc54e3a
SHA512f779f0907822ea2a91faceaff840d7114200a7c9bb9efad956828b2d85907a4156570dfa3db4c898290b8f9c3aa96fc5206f4b72280f9e2acb224ddd9a1f9e29
-
Filesize
352B
MD5b81234702ac98fd7bf1d6f339b41f86a
SHA14d3eaaefa21cba6898c8f4ec0fe3ca8179a2b000
SHA2567958cdc163d3c3ade4fd7c03cb71eb978e41ee39227359cffef8c835b4941f98
SHA512a146d5c77f2b5d2a649b9195ac05b2a85afb45a2e8d4986dfdd7a470e2078b471e16560df00d5a78c45f48a7dbaff916c818523cb61d5c961b32de5e8c8ceb54
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2