Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:39
Behavioral task
behavioral1
Sample
9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe
Resource
win10v2004-20241007-en
General
-
Target
9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe
-
Size
29KB
-
MD5
7c63bd36884fb910e7f91dca0e584a54
-
SHA1
86ee97d2c6d5e3876dcda3029897f8637f104031
-
SHA256
9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57
-
SHA512
ca9f390c305bf9cd86528a4490906f31d0717fcee9dc927e424b84be653d5900261baa0a289faa4d17a7ff785e9298f3cc69529fe7e4c65399735207b8af45e4
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/4h1:AEwVs+0jNDY1qi/qQP
Malware Config
Signatures
-
Detects MyDoom family 2 IoCs
resource yara_rule behavioral2/memory/1664-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/1664-56-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 4744 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/1664-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023c97-4.dat upx behavioral2/memory/4744-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1664-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1664-56-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0004000000000705-67.dat upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe File opened for modification C:\Windows\java.exe 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe File created C:\Windows\java.exe 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4744 1664 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe 82 PID 1664 wrote to memory of 4744 1664 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe 82 PID 1664 wrote to memory of 4744 1664 9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe"C:\Users\Admin\AppData\Local\Temp\9f3f94e7e921d6fa71928030386edbaede9d83679439d8a74ec19b992225ce57.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5f5536500efe65d2af187420e60e4f76c
SHA173f61963dbb2ecaaaddb113b02ab0e11227c1171
SHA25674923e71520f37878d4c19171db9d968c6c4c2c120f3b9dd71d747eb0d70e220
SHA51211e77f737987b71129038ede938e33bd8b6ba7298cfb5cb1b55847b8d8f26bde6f8571a03ec48d015c1b2d5615227b5a35890030508b7047dc382d0d392b5aae
-
Filesize
320B
MD53aa9ce6ab8e41d4d7a1c30f8ee885c6c
SHA1c9f822105b966bb6ea35feab6792da0154005c35
SHA256fd1ac1ede4c8e14fb8dc733034352894e1e2fe5cdde6fee2ba2a74450168967d
SHA51220fc2ba8de356879884f5943d1cf951194d7100d2d5ecdeaacb78c1473659392474b6b941c1474dfc60f5debecc9400c30f79583cb7b07e2296a468efcea6934
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2