Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 10:08
Behavioral task
behavioral1
Sample
8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe
Resource
win10v2004-20241007-en
General
-
Target
8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe
-
Size
29KB
-
MD5
1208bcf786445fb6ec625297034743f0
-
SHA1
322e137a2c9f8090387c83b2e1e15afb4f74bacf
-
SHA256
8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681f
-
SHA512
512ed0d7839ccb9fd48a82daf065b4dc29ad07286251e630a15baaa302ab567b51213ea4656b37ed278595309cb4689daccf6d26675a486d8528919b7fa89da1
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/ZuI:AEwVs+0jNDY1qi/q7
Malware Config
Signatures
-
Detects MyDoom family 5 IoCs
resource yara_rule behavioral1/memory/2224-17-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2224-41-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2224-65-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2224-69-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2224-71-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2744 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2224-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x0008000000018bdd-7.dat upx behavioral1/memory/2744-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2224-9-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/memory/2224-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2744-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2224-41-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2744-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x003100000001875f-57.dat upx behavioral1/memory/2224-65-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2744-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2224-69-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2744-70-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2224-71-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2744-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2744-77-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe File opened for modification C:\Windows\java.exe 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe File created C:\Windows\java.exe 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2744 2224 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe 31 PID 2224 wrote to memory of 2744 2224 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe 31 PID 2224 wrote to memory of 2744 2224 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe 31 PID 2224 wrote to memory of 2744 2224 8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe"C:\Users\Admin\AppData\Local\Temp\8ea480e0780edba434e257b394b6f3adcecf690eb3b63f31c05dd0f6d71f681fN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD568887660d6d767ae2fb70604ee1c63bb
SHA15865dd909a5ec7dc7c3221f3b228af7055dd9b01
SHA256b64f548a2ef8cb7e1cab980dded547a258d216b57b681785dbdcbbf581b2a632
SHA512729c24278ed20298beac9573861536dc1efba0d5f5a5c713b46b378c3db56881911a9f1b83380985f9c7f3cda0e5239062f881f8bb95bd2ac5f7d0f8ddaa02bc
-
Filesize
352B
MD58f8b5c13c8827c35ec277702c69f1b55
SHA1964044abfa4283efaa26fe55989bde24d8fdcb51
SHA2566599d46f174d51871db1b0dc136f05d4969771812ba2f3f65a269051eee592cd
SHA5123e79918378a42144b11d277a4fdf93f6a235c2ae77d24ad3ec7e9a1eb7f618a704828e43bae390d4d98be5a223270bd7d3d08a6bb65308e52ba789f278e0a6d8
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2