Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 22:54
Behavioral task
behavioral1
Sample
915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe
Resource
win10v2004-20241007-en
General
-
Target
915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe
-
Size
29KB
-
MD5
8e7f11fe590afed263476a3c96156a00
-
SHA1
3e9238a191e9ba15b25ac5ffba4c14124e377172
-
SHA256
915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecf
-
SHA512
7e8e50b05ef669e832e81927954f0b53bbaac39ec8d66bfb853a34be8caa52b99e3573bb624235b4ab443b4dc731a54999d1e27dab0d2ef0b99527efa9fa31b3
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/E:AEwVs+0jNDY1qi/qM
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/1452-17-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1452-32-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1452-58-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1452-60-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1452-65-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1452-72-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1940 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/1452-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/files/0x0008000000016c7c-9.dat upx behavioral1/memory/1940-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1452-4-0x0000000000230000-0x0000000000238000-memory.dmp upx behavioral1/memory/1452-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1452-32-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-48.dat upx behavioral1/memory/1940-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1452-58-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1452-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1452-65-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1452-72-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-78-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe File opened for modification C:\Windows\java.exe 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe File created C:\Windows\java.exe 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1940 1452 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe 30 PID 1452 wrote to memory of 1940 1452 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe 30 PID 1452 wrote to memory of 1940 1452 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe 30 PID 1452 wrote to memory of 1940 1452 915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe"C:\Users\Admin\AppData\Local\Temp\915ae2d4d707525e8ffaf52780e9c2df8e4e7177b9728b87a015f22669096ecfN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD509b93f29e8dc975deb78f66db390db48
SHA17dcbca32ed2feaf2d8f2be099cc35e8345f7659c
SHA2562a5199d21863cf5618df0e28b7a93c717a02648210568640c579fea5232000b9
SHA512033515767bc5a8576838b6cce2ad9f445debd07ca31aa98bfc35ac400d73da1516f151f742f2325f77b442c4b7870037696defedca850c0fe50921651f847af6
-
Filesize
384B
MD5f9c4cdd0e115826d423e2ee8ce675bef
SHA161fe625ff39ea06ae7590c74649af68d187789f3
SHA25641b436c3c09522704f2a5626e4cf6a389c42522da6ab71929972948fe27f3597
SHA5123af7a3450ae7c2ded507ccc179904e93a51450cb68b8bc46c256e9ac9b7319e97d42b7b9968a6d3105555472a1062ed9495ba0fcdc91596f46a9ce82ae50e8c0
-
Filesize
384B
MD506afec63d9f37c4488e98e8f673da8e6
SHA17abee7bd4d4db677db4ef4c514fb9053d5413c9f
SHA256bfdbefece42bbc4634500c530f6918dd9be8b2e519ebe1f26a2a855991144549
SHA512cc3ebbb52f3590e984354af9e9685e54c42e57df37535f8039f314f8837d5539361ca446dea7e5304f637547bab87372baa6371df1255bfa46b2a8740b9162e9
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2