Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:05
Behavioral task
behavioral1
Sample
61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe
Resource
win10v2004-20241007-en
General
-
Target
61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe
-
Size
29KB
-
MD5
3a9851cc666ee331258cc1e208a92929
-
SHA1
0fb4405948e786918ac74cd70f8ca9335a9205b1
-
SHA256
61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3
-
SHA512
5fc9d3a681a68788332c7d41cc30b83937ac1b6eb60be4271437c3f7a746e25991f684d66be5dcee5dbc1c1235560fd4fc60512be8b61a020e2fc9637ebb4fab
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Xh1:AEwVs+0jNDY1qi/qvP
Malware Config
Signatures
-
Detects MyDoom family 4 IoCs
resource yara_rule behavioral2/memory/4824-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/4824-56-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/4824-131-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/4824-169-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 4784 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/4824-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0007000000023cbb-4.dat upx behavioral2/memory/4784-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4824-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4784-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4824-56-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4784-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0003000000000705-62.dat upx behavioral2/memory/4824-131-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4784-134-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4824-169-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4784-170-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4784-174-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe File opened for modification C:\Windows\java.exe 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe File created C:\Windows\java.exe 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4784 4824 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe 82 PID 4824 wrote to memory of 4784 4824 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe 82 PID 4824 wrote to memory of 4784 4824 61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe"C:\Users\Admin\AppData\Local\Temp\61103e66654bf79f1f708db8a5888f1887dd004e6657f37314385ace75aa54f3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD57091fcf660643aab0a6fce7e60d7c1ee
SHA1f86f9a9cddf18a667d38173f56ef6bf261f71077
SHA25647a4b01671fcbcd8a65a6a3f7c54290f943548dd0e67346ebace751cb45e1379
SHA512d56ba22ff4eb4ad56111fadf067a0bc0b922e913b39b48b53afd132006ceca4bb2a772013c04e309b1a4c1b554e730d21d166b83477169d0cb4cf1ea82bac4ce
-
Filesize
320B
MD5d54764c244edff1a285dc02768983696
SHA18ac327750c20c3879d1c625ab177c7890d0d5c6d
SHA256cf8bb72c02db4351b2fedbd26f036a9c545e2cfdcf95b95ae49532c9c1524b01
SHA512ad4262fda3c27dfa4996d6b109ca2e2703fadd3eed0c74491a9ee36c52c482e898620b4424620efdd7fd072afcc7013bdee98412f34d64923330768a13a5a707
-
Filesize
320B
MD592a028f551b3f6a97e06c0e3d7a78a38
SHA1ead0e8a2904cbd0a82eb9225fb8fc0f8abb24fe2
SHA2560e92e915967217f10326cc15b02c5bdf9d05b1fee7dc66ef62ec621ab3a4261a
SHA51257150d57e1755d44c77cd63860225a93a20adf35bd576144ef57988cbae6c1bd2c27c1a4df095d5abcfca5640c8279bfc0f574cc40946f0161dfc3c3b25c7a21
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2