Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 02:35
Behavioral task
behavioral1
Sample
c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe
Resource
win10v2004-20241007-en
General
-
Target
c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe
-
Size
29KB
-
MD5
0bc198bfe9e5f961d6b804f12bb7ec1d
-
SHA1
d40fd969258c3a9c5603fadde5cab23e59281bfe
-
SHA256
c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec
-
SHA512
6b570382318dabfa180ae277d1892bcfbb8cac27bd50fbd412bdf819b32df51b85f5237c95477496aeeac143057da0add0842e8119d9c4fe4d0191378d12f9e9
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Ah9:AEwVs+0jNDY1qi/q4n
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/1716-15-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1716-47-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1716-71-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1716-75-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1716-80-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1716-87-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2956 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/1716-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1716-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000016eca-9.dat upx behavioral1/memory/1716-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2956-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1716-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2956-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0004000000013d08-63.dat upx behavioral1/memory/2956-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1716-71-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2956-76-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1716-75-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2956-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1716-80-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2956-83-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2956-88-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1716-87-0x0000000000500000-0x0000000000510200-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe File opened for modification C:\Windows\java.exe c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe File created C:\Windows\java.exe c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2956 1716 c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe 31 PID 1716 wrote to memory of 2956 1716 c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe 31 PID 1716 wrote to memory of 2956 1716 c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe 31 PID 1716 wrote to memory of 2956 1716 c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe"C:\Users\Admin\AppData\Local\Temp\c3a35fd5fdba62bed21d5ebbdefe0f8536f9a0093c48bb7c2da3b07aa32b89ec.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD520623326b457a1d45c0342f8833dd89d
SHA149862210b949a9d69ba478a0c71580cf7ee6dca5
SHA256165e09e82d428b5cbd098d0e754e168d3b4dcace98771fd18e357c2cefe7cd66
SHA512fa23c8c114b5ad2a00d014d9b4d4dc9d08d985df4772e82402a325b590ed186f994726a9ab94e27653cc8d46f44183087f2e4994287f5c5c76d2963c26b062f4
-
Filesize
320B
MD515aea26c6c35cd2b1e71acb1f2fc5e5f
SHA119435870cc23c915aafda6a2dd2f8a95e900b985
SHA2565c8c5eb7a97efebad5b37a9eb1ba6262affbd8913c550a223bc3f8e046d3ba58
SHA5126c96c56f4d8ce4d5be0ac05abb2d390755e36c6ded6e157b61367dd3d846359ddcef7eba0ad24bc1b0a725b7b687305e36140dd8e423df6b70c82754c61f3942
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2