Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 02:38
Behavioral task
behavioral1
Sample
message.htm.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
message.htm.exe
Resource
win10v2004-20241007-en
General
-
Target
message.htm.exe
-
Size
28KB
-
MD5
114fbe230bfd147d05fcafbf7cd22ede
-
SHA1
3595cd4e3ce3752296d8c466a7d9c240f0401b39
-
SHA256
f33dc2556ec5c4ec048951b7d1d366fe9c225f9a66e63263c54fed9bb3bcb680
-
SHA512
a7b31d95664a803ca6c1afb6170ba3c9a25d5c945335657f2b7b24c3e421328d1d8daf1c6a0b2079b39358147314b06b401dedb2ceb618a45195b6eb84b136fb
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNySOu:Dv8IRRdsxq1DjJcqfUOu
Malware Config
Signatures
-
Detects MyDoom family 11 IoCs
resource yara_rule behavioral2/memory/2936-13-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-27-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-32-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-126-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-145-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-154-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-185-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-218-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-255-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-291-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom behavioral2/memory/2936-338-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1264 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" message.htm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/2936-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000d000000023b79-4.dat upx behavioral2/memory/2936-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1264-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1264-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1264-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-27-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-32-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000c000000023ba5-43.dat upx behavioral2/memory/2936-126-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-127-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-145-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1264-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-154-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-155-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-185-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-186-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-218-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-219-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-255-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-258-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-291-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-292-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2936-338-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-339-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe message.htm.exe File opened for modification C:\Windows\java.exe message.htm.exe File created C:\Windows\java.exe message.htm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language message.htm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1264 2936 message.htm.exe 82 PID 2936 wrote to memory of 1264 2936 message.htm.exe 82 PID 2936 wrote to memory of 1264 2936 message.htm.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\message.htm.exe"C:\Users\Admin\AppData\Local\Temp\message.htm.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311B
MD5593192ca95413c197b2b34ef10fee9e3
SHA176efabd5fc9a2c297384883c8adec463e492896e
SHA256ffcebeaee31d4944d14ed393a22bca4715f8d17f3580fa3e3d6f05d03732a8bf
SHA51261be629d128309af1c36579e160ff30b14fb332f1440c048bf24620faa33f8bfd756e97398a4464e415abcfd39d0bee7cac57559b7ec29692c0640a2a76b361a
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
308B
MD55243568476eb2052b2f3b67dc9053e86
SHA1b126aa6506772f9024b76580bdf28b45e3a7f051
SHA2562d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80
SHA5123c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833
-
Filesize
304B
MD5cde2c6ec81201bdd39579745c69d502f
SHA1e025748a7d4361b2803140ed0f0abda1797f5388
SHA256a81000fc443c3c99e0e653cca135e16747e63bccebd5052ed64d7ae6f63f227f
SHA512de5ca6169b2bb42a452ebd2f92c23bad3a98c01845a875336d6affe7f0192c2782b1f66f149019c0b880410c836fc45b2e9157dcccc7ad0d9e5953521a2151d4
-
Filesize
302B
MD5769768a36c7e2fcb2db7f35ef986ce82
SHA10b6699476462d2139e553f0f78ff46890d37d336
SHA256f262291ff7be8b0e2e846525c772c214799fc26b244abad6a686c7c4ff8cbba2
SHA5122fa0310627270dac3f4e581bef0036743eed32403f913c833aeafdf7fac373ccfb0117cabd94725dfee672345ca3f46182377340e15e2fba38a874946683ee67
-
Filesize
311B
MD5cb42662caffe525e9957c942617edf06
SHA1615009db9a1a242579e639ee0fc7a2a765095bfe
SHA256312bf5c9a1a122abc6361bf8ed01a44346285b962c0d273ef2de0eb796ae1b15
SHA5123e6777f1f74f64fff6cb2bd1a81a6c08d9a64feeebc3deb7cacb8f0f41b23a5c59a8e6294b99c76dd386aaaf9043a1a252ac47910fe1801bdc2995f7b675692c
-
Filesize
313B
MD5ffb72ab4faba49ad441ce07db37dd8b6
SHA1194e13c1c32ebb6e7a1dc912261cbd58a82ff71e
SHA2567bd7c3676e98ddde8e0d5b63dd22cb9379d975bcd1d68884c97565cdd8d03660
SHA512517be20d2442489ce39b48dc7f9f6f13f8c45d02703fb1865071f553d36b2289f5abc26c6089fc0bfad1a41fe318bf4b5a806915c5e45898ac744b7e4ed30257
-
Filesize
28KB
MD53299c445a8f4fb9325dda2fe900e9282
SHA11cc68ccd4e37caa54d1961d42c0237824d16bb8f
SHA256b45165423835605d393c77e1f339b2233e3e64aec3b7f4d817eb59ee4b0e9517
SHA5124e311b750605cc44beb4d884535245eeb3796680f0267c00da6cfa18b8eb60ceefc1921e5e671fc11d3f54a6109c30dfc4428c2bd2f26eb4b963e230d687996e
-
Filesize
1KB
MD513437d22211dfcbcbb54946a6388341c
SHA1bed208a01060805c70af98a9a7fe20ee2352b76e
SHA256dc4011c30d51492434e1ad3fbf952a537d3b68406a816bafc4dbba68e83f4efd
SHA512529f7cf2a04c2cdcea83bc749c0e17f50cf912ea153581919ca90c57b351c048d36bc0e166208bfa0c02ca11af9dd18876254a81a10fa19c1defe613e1965a34
-
Filesize
1KB
MD5f5ee74c8717ce26c3c63ac84a8715565
SHA1e6db2c8fa33b40bad5bd4700a1d74edaf366fb47
SHA2564c6aa4535d75df4b20e2797e8ebe898221d9b6fdc22d13fa6a3be997253970fa
SHA5125a8fe1b125cd303dac13082a97c23ba9fd475da03e417130ab975459e2c435e4c260839cf970cfb53dc2a847ff7e96c7404e3ed8c283f42b72871ed7b453d11f
-
Filesize
1KB
MD576a1b2545f30b8710d78c82036905ea0
SHA1a6e5d170b9be9057abac3ee2ebbf01b72608dcf8
SHA256369edbd91d82dfc036039b0c0ea658ff994dc777d95246b6b59346d86acf5413
SHA51298b798d6db4a9f95eafcd79efdd514e8a3bb22497c8d0fdd1fbd7b4f329bb9143eab7dddc3881c8ae04ba6c4105406f94a0b9ac05236ba0f9128f5c54313eca0
-
Filesize
1KB
MD5111cf26ff859ca4c9397a27fd83f9550
SHA1dee38a97c8d73971e362d6ad008a61a224d1fb76
SHA256a5f22fa63d0eb784758c1aeaa08cdb52a6fa54d70f46c427803fc92a90eea361
SHA512fd1c738603dcc087367277dcc0d77f34dd80e7ee0ca81a6dbdba483413a9f8583555a167284c369699bbff98c533da5566add94d13fb075aad082170c741d61c
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2