Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 05:21
Behavioral task
behavioral1
Sample
48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe
Resource
win10v2004-20241007-en
General
-
Target
48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe
-
Size
29KB
-
MD5
897ed34a34e2c8254a56d827359f0100
-
SHA1
3b11124ee55e15c61b501b89dc687101cc816464
-
SHA256
48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374
-
SHA512
0f71076cf581682b2b2ea2ec19fd4b3fc47944cbb27bee7dfceb9d98577fbbdc131a4db7ef8a160ba6f289952f4142e85d46a5c48d17353d13a1c881899bfefd
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/u:AEwVs+0jNDY1qi/qG
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral2/memory/540-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/540-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/540-39-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/540-120-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/540-147-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/540-154-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 4744 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe -
resource yara_rule behavioral2/memory/540-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023c97-4.dat upx behavioral2/memory/4744-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/540-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/540-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/540-39-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000900000001e786-50.dat upx behavioral2/memory/540-120-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-121-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/540-147-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-148-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4744-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/540-154-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/4744-155-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe File opened for modification C:\Windows\java.exe 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe File created C:\Windows\java.exe 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 4744 540 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe 84 PID 540 wrote to memory of 4744 540 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe 84 PID 540 wrote to memory of 4744 540 48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe"C:\Users\Admin\AppData\Local\Temp\48b837eb180bbdbc88ab3ec1a5674dddcd3d93631a85834519a0d2f7ddd82374N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD5f895ee91c0cfc55c58bef82dd1b4eb74
SHA185a9e60bf6bb8dbf86ce8ed75d51a0071ba535b3
SHA256b7cd4c7b13eee885ea8b4d26007ea9c66f50faef2156b74de4d96603037df957
SHA51287c765f1d800e9871c5aae6d9749fa324a4ab50f6c1d473618bee53ad7551974e007d9d3fc0b794f0d7546259fd0924c7338102d883270aba700be867f77a962
-
Filesize
320B
MD5367fc19c34655812d79719ddaef828ff
SHA1110b0c84f51db10c6bad40f5104eacfa0df6a29d
SHA2563d3045fff18d21d001a673a63fdae8c89f2c968e043f7d5791937a482b80b778
SHA512743f5619e8c1cc8b874c6a1b5af159f915c4ad9153532ee4bb0e7ce08169ce940005117bd77e4ec16ab4a94ca6cb752959e2a41ae565187d151f844ee18b4c17
-
Filesize
320B
MD567792b543d38eb202bdb36ac6164a185
SHA1f7790d0acdac461ea9eb7915c6c04fb27165312d
SHA256b0ea6d8411d54dddcdcee368a4e0ee9f712c07a531323cb1ad5dea024f829f64
SHA5129e51dedf0b368e3f715b72bc18891d8b82398693e323ce54b8424d75e31bd9e6512cfb610b52266557558f6125c42e97479cfe6d09981b1f7cc29a55003f7db3
-
Filesize
320B
MD5f6dcfd8ca50cb03b67671bdc21396b7c
SHA13f28e3f6d56986059f211417793857737789a7dd
SHA256dc17605ebd74d8fff069653938892828856f4e978afb70f5b0084bdd6b268b17
SHA5127875fb5ac6e508d318bcaeac8970e9977bb66686b842c36b90b5a5dd74c67ed0a6614842c25460deb6270274b1f5a9183f60713502937c073b78f636820000ca
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2