Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 18:24
Behavioral task
behavioral1
Sample
cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe
Resource
win10v2004-20241007-en
General
-
Target
cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe
-
Size
29KB
-
MD5
5c1abf159fe91755cedd428d389580c0
-
SHA1
a8f57eb31adf813fa390a86ed12f1a41e521d644
-
SHA256
cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066c
-
SHA512
a9ef249c7e8ee59c90d8113ac12f8fb4a39eba81356f5a9d41255a1f0028694fec16db988ad48cea1b4d2ed5416ce30ef677fb99db8bdbcf4a3cadcdfbc05a5d
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/l:AEwVs+0jNDY1qi/qd
Malware Config
Signatures
-
Detects MyDoom family 8 IoCs
resource yara_rule behavioral1/memory/2460-2-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-16-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-31-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-36-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-57-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-59-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-64-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2460-71-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2336 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe -
resource yara_rule behavioral1/memory/2460-2-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2460-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x00060000000186f2-9.dat upx behavioral1/memory/2336-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2336-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2336-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2336-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-31-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-36-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-47.dat upx behavioral1/memory/2460-57-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-59-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-60-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-64-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2336-70-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2460-71-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2336-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2336-77-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe File opened for modification C:\Windows\java.exe cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe File created C:\Windows\java.exe cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2336 2460 cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe 31 PID 2460 wrote to memory of 2336 2460 cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe 31 PID 2460 wrote to memory of 2336 2460 cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe 31 PID 2460 wrote to memory of 2336 2460 cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe"C:\Users\Admin\AppData\Local\Temp\cf8ed3a33c205c15795a39d4f0a1fe11da8fbdfc47075fc833f509567b8c066cN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5bdd3f5f045727c1800b2ddf9af3fcf68
SHA1e26562818ce921d3618de87fe60ab93e58b831c8
SHA256100915f0854b5db300f9bbd5e982fd7d41389c9da71aa7957b293c20c8183ab5
SHA512ac70d0dadd10c4cfb00c1a193641bcc0642c6c5975b308d60b3cc1343f94d3f11e4d593baf82a9dbed39375e1f682ae3bd2ed9b1c31801e3c97127a7c9786ffa
-
Filesize
352B
MD5baaed1fefa4c21fed01c137a02db8560
SHA16cfb1161352ce0b1e07d58e1c84f364b90ae6137
SHA256d8b05ceead1dcc0dd41f3fc32a6883c8bede4d5beecec907ec8352c949c596e8
SHA5122f7081daf79a2fd87d7993e54260e573fa0cde2c5d9d0f7a5c2387a31d0b8682e87ea226bf5d1e8ab6150acc05649a455db9813b42afbb1d9dba1a715a4c15e5
-
Filesize
352B
MD564d8d8143eef4aadde23dbc20b97c445
SHA1b451e861fd85840bf4770e9b8f22632d8902e615
SHA256e073b3baf999e48fdd8510be8ce5f4bd882a768652121254aa3a231778af40c1
SHA512b1c91a31f7cf8776bbd68878ba33ecaf57626571189ef41aa5d4daee055b5a012817c447dedabf50bbc6f788f8058b02d5fe8bc4f657449fb30da78a5d186712
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2