Analysis
-
max time kernel
120s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 20:14
Behavioral task
behavioral1
Sample
d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe
Resource
win10v2004-20241007-en
General
-
Target
d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe
-
Size
29KB
-
MD5
618f37d24da24fa056aa0d194af0a460
-
SHA1
d6c2180c27d7a4affa5d0f9b255a2e82c3ee4809
-
SHA256
d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5ac
-
SHA512
0f7468a4116794892aa8c38197623f3257e0153538c30e9ffe58cb18ab02a8fd1bdd408d3dd8070d0923795fad6249f5f765f18667ecb03a6d76f51629ba73aa
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/W:AEwVs+0jNDY1qi/qe
Malware Config
Signatures
-
Detects MyDoom family 4 IoCs
resource yara_rule behavioral1/memory/2792-15-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2792-52-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2792-68-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2792-72-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2988 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/files/0x0008000000014b28-9.dat upx behavioral1/memory/2792-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2792-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2792-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2988-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2988-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2792-52-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2988-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-63.dat upx behavioral1/memory/2792-68-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2988-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2792-72-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2988-73-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe File opened for modification C:\Windows\java.exe d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe File created C:\Windows\java.exe d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2988 2792 d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe 28 PID 2792 wrote to memory of 2988 2792 d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe 28 PID 2792 wrote to memory of 2988 2792 d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe 28 PID 2792 wrote to memory of 2988 2792 d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe"C:\Users\Admin\AppData\Local\Temp\d6d451bf59138110986b346383bb6c4b563d18071be647d20b7e5f205b77e5acN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5e2483fe300b860faaefdbf18d8a577da
SHA1586f462d3112c54cf633b7e07c7676f4d76cc512
SHA2568608d909b491b28e36abffc619899e7f688838de92e1e7a552eb6c7d615a463e
SHA512834a504441a350f1365264b6afdc134e778c5057d0bb60a97b2cc0acfadc301d116f471452bbd6cbe8b531d8a9dd4fa79c4d767de85e1ee59b78e71122ee192c
-
Filesize
352B
MD589c01218fca1828d37782e4dc4d93dc2
SHA115351060db1a33260c1c63e5cf39fba32e944993
SHA25681ccaa80bebe5fac0caf99299ac8ff84ab03ceb0a50a65d745203b7f941947fa
SHA5128c26e23d41e28ef79cacc08f29c353e876edb61e3317f2876d7422cabad90a421396543b42f882a81a4384b665c3fdb9a4f04301425825add1a99b2ada6da113
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2