Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 04:17
Behavioral task
behavioral1
Sample
23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe
Resource
win10v2004-20241007-en
General
-
Target
23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe
-
Size
29KB
-
MD5
74b46fd477e9f2e6133499b02b010310
-
SHA1
0fae045ceaa8d28bc38163bf60c82063d2b3f267
-
SHA256
23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921dec
-
SHA512
c71d7a9ad5399e5d4853cef77a12d0880fcb560fc1056b666c5ad35999e7dd219daa86f270f35d8da5530b33eb5c1155933c31e1523684ee2cee05e4132ce6d3
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/2G:AEwVs+0jNDY1qi/qr
Malware Config
Signatures
-
Detects MyDoom family 3 IoCs
resource yara_rule behavioral1/memory/2696-16-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2696-55-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2696-60-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1908 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2696-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2696-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0009000000016a66-10.dat upx behavioral1/memory/2696-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1908-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1908-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2696-55-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1908-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2696-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1908-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0009000000016cc8-74.dat upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe File created C:\Windows\java.exe 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe File created C:\Windows\services.exe 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1908 2696 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe 30 PID 2696 wrote to memory of 1908 2696 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe 30 PID 2696 wrote to memory of 1908 2696 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe 30 PID 2696 wrote to memory of 1908 2696 23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe"C:\Users\Admin\AppData\Local\Temp\23619fd467372e0247f8a61cf187b2dee35ae750df8548e5f354ed68e7921decN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52d916f735ed09ca0ccd3084e728759ce
SHA1848bf085ac4f81d6be8ed20dc4b64bc97e6f31a9
SHA256a3901a4688084a1b6058e40f1649998bb35757e63e641d115af11752d0d29c23
SHA512396233b970af817afc5e677d02d9d9324019907f49c1ae958762344f3babba1110590ab2193d2358779eadc4214088da95b49aa038173d0ad9fc15381ed7476b
-
Filesize
352B
MD54a64815b04913eb41702b7baeeb12e7a
SHA155122526b61ae9f9370207234f99907fcfee977b
SHA256ac7f7fbf6f6d9405517d8b8ff6a3be8900ccdf248b9f9b0fd01697c0c8bb7cb0
SHA512487a5ff073d514e537432fa93556418d2f750d876662ba4a0b0567aa18d17136afd68192ed9aefca438c30ca061dc808611a76a6455e1b1feaa13f00bf79cb18
-
Filesize
320B
MD5b6039089ca40e44bded12824161af822
SHA1a4783bec5b3be42f96750c3f63b6bc8186eea501
SHA256a4a3c815da05c3e6fead56969c3384cc80499518ee327a67d36b1ead554cdffe
SHA5128ed69572861def29f480d6a9b997f2cb154e5a1baeae8b08da227c88dedce8a4260892b5d1cd03fca9af5d9c409b49d944b61ffa4ae8f7012b178bac6d27ab95
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2